We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Systematizing modeler experience (MX) in model-driven engineering success stories

    Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...

    Reyhaneh Kalantari, Julian Oertel, ... Silvia Abrahão in Software and Systems Modeling
    Article Open access 11 July 2024
  2. Federated learning for digital healthcare: concepts, applications, frameworks, and challenges

    Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...

    D. N. Sachin, B. Annappa, Sateesh Ambesange in Computing
    Article 10 July 2024
  3. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  4. Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements

    Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...

    Claudia Negri-Ribalta, Marius Lombard-Platet, Camille Salinesi in Requirements Engineering
    Article Open access 10 July 2024
  5. Signal processing implementation of low-cost target speed detection of CW radar using FPGA

    The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...

    Sameh G. Salem, Mohamed El Hosseny in International Journal of Information Technology
    Article Open access 10 July 2024
  6. A robust method for malware analysis using stacking classifiers and dendrogram visualization

    Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...

    N. Naveen Kumar, S. Balamurugan, ... P. Seshu Kumar in International Journal of Information Technology
    Article 09 July 2024
  7. iDOCEM

    In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...

    Charlotte Verbruggen, Alexandre Goossens, ... Monique Snoeck in Software and Systems Modeling
    Article 09 July 2024
  8. Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions

    There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...

    Jobin Thomas, Murali Parameswaran in International Journal of Information Technology
    Article 09 July 2024
  9. Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method

    The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...

    David Leonardo Mancipe-Huérfano, Rafael Guillermo García-Cáceres in International Journal of Information Technology
    Article Open access 09 July 2024
Did you find what you were looking for? Share feedback.