We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Exploiting beam search confidence for energy-efficient speech recognition

    With mobile and embedded devices getting more integrated in our daily lives, the focus is increasingly shifting toward human-friendly interfaces,...

    Dennis Pinto, José-María Arnau, ... Antonio González in The Journal of Supercomputing
    Article Open access 15 July 2024
  2. Retraction Note: Adoption of human metabolic processes as Data Quality Based Models

    Alladoumbaye Ngueilbaye, Hongzhi Wang, ... Daouda Ahmat Mahamat in The Journal of Supercomputing
    Article 15 July 2024
  3. Improving requirements elicitation in large-scale software projects with reduced customer engagement: a proposed cost-effective model

    Effective requirements elicitation is crucial for the success of large-scale software projects. However, challenges arise when customers are...

    Tauqeer ul Amin, Basit Shahzad in Requirements Engineering
    Article 15 July 2024
  4. Parallel implementation of discrete cosine transform and its inverse for image compression applications

    This paper presents the graphics processing unit (GPU) implementation of two-dimensional discrete cosine transform (2D DCT) and inverse discrete...

    Debasish Mukherjee in The Journal of Supercomputing
    Article 15 July 2024
  5. Secure query processing for smart grid data using searchable symmetric encryption

    In the last decade, the smart grid has utilized many modern technologies and applications compared with the conventional grid. Cloud computing offers...

    Samia Souror, Mohammed Badawy, Nawal El-Fishawy in The Journal of Supercomputing
    Article Open access 15 July 2024
  6. Conscious points and patterns extraction: a high-performance computing model for knowledge discovery in cognitive IoT

    Incorporating cognition into the design and architecture of the Internet of Things (IoT) has recently been the subject of much research, giving rise...

    Vidyapati Jha, Priyanka Tripathi in The Journal of Supercomputing
    Article 15 July 2024
  7. Exploring the dynamics of ICT and globalization on human development in India: asymmetric analysis and policy implications

    The present study examines the asymmetrical relationship among globalization (GLB), information communication and technology (ICT), and human...

    Jancy Phore, Deepa, ... A. K. Saini in International Journal of Information Technology
    Article 14 July 2024
  8. Application of neural networks to predict indoor air temperature in a building with artificial ventilation: impact of early stop**

    Indoor air temperature prediction can facilitate energy-saving actions without compromising the indoor thermal comfort of occupants. The aim of this...

    Cathy Beljorelle Nguimatio Tsague, Jean Calvin Ndize Seutche, ... René Tchinda in International Journal of Information Technology
    Article 14 July 2024
  9. A network intrusion detection system based on deep learning in the IoT

    As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...

    **ao Wang, Lie Dai, Guang Yang in The Journal of Supercomputing
    Article 13 July 2024
  10. An empirical study on cross-component dependent changes: A case study on the components of OpenStack

    Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...

    Ali Arabat, Mohammed Sayagh in Empirical Software Engineering
    Article 13 July 2024
  11. Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling

    To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...

    Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad in International Journal of Information Technology
    Article 13 July 2024
  12. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification

    IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so...

    Furkh Zeshan, Zaineb dar, ... Tariq Malik in The Journal of Supercomputing
    Article 13 July 2024
  13. VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier

    A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...

    A. V. S. S. Varma, Kasiprasad Manepalli in International Journal of Information Technology
    Article 13 July 2024
  14. Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling

    The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...

    N S Koti Mani Kumar Tirumanadham, Thaiyalnayaki S, Sriram M in International Journal of Information Technology
    Article 13 July 2024
  15. Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application

    Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...

    Subhash Kamble, J. S. Arunalatha, K. R. Venugopal in International Journal of Information Technology
    Article 13 July 2024
  16. Software verification challenges in the blockchain ecosystem

    Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...

    Article Open access 12 July 2024
  17. Research on satellite link allocation algorithm for Earth-Moon space information network

    With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...

    Weiwu Ren, Yuan Gao, ... Hongbing Chen in The Journal of Supercomputing
    Article 12 July 2024
  18. Intelligent Personality Assessment and Verification from Handwriting using Machine Learning

    It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as...

    Pradeep Kumar Mishra, Gouri Sankar Mishra, ... Tarun Maini in International Journal of Information Technology
    Article 12 July 2024
  19. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
Did you find what you were looking for? Share feedback.