We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method

    The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...

    David Leonardo Mancipe-Huérfano, Rafael Guillermo García-Cáceres in International Journal of Information Technology
    Article Open access 09 July 2024
  2. Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions

    There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...

    Jobin Thomas, Murali Parameswaran in International Journal of Information Technology
    Article 09 July 2024
  3. Requirements for modelling tools for teaching

    Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...

    Jörg Kienzle, Steffen Zschaler, ... Sofia Meacham in Software and Systems Modeling
    Article Open access 09 July 2024
  4. Multidimensional graph transformer networks for trajectory prediction in urban road intersections

    With the rapid development of autonomous driving, accurately predicting the future movement trajectories of various agents in complex scenarios, such...

    Xuefeng Quan, Dening Luo, ... Gexiang Zhang in Journal of Membrane Computing
    Article 09 July 2024
  5. Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring

    Predictive monitoring is a subfield of process mining that aims to predict how a running case will unfold in the future. One of its main challenges...

    Efrén Rama-Maneiro, Juan C. Vidal, ... Pablo Monteagudo-Lago in Computing
    Article 09 July 2024
  6. What you see is what you trace: a two-stage interview study on traceability practices and eye tracking potential

    The benefits of traceability have widely been discussed in research. However, studies have also shown that traceability practices are still not...

    Maike Ahrens, Lukas Nagel, Kurt Schneider in Requirements Engineering
    Article Open access 09 July 2024
  7. Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism

    Crop diseases are among the major natural disasters in agricultural production that seriously restrict the growth and development of crops,...

    Yifu Zhang, Qian Sun, ... Huini Zhou in Computing
    Article 08 July 2024
  8. A splash of color: a dual dive into the effects of EVO on decision-making with goal models

    Recent approaches have investigated assisting users in making early trade-off decisions when the future evolution of project elements is uncertain....

    Yesugen Baatartogtokh, Irene Foster, Alicia M. Grubb in Requirements Engineering
    Article 08 July 2024
  9. Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model

    One of the preconditions for efficient cloud computing services is the continuous availability of services to clients. However, there are various...

    Raseena M. Haris, Mahmoud Barhamgi, ... Khaled M. Khan in Computing
    Article Open access 08 July 2024
  10. Detecting mistakes in a domain model: a comparison of three approaches

    Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...

    Prabhsimran Singh, Younes Boubekeur, Gunter Mussbacher in Innovations in Systems and Software Engineering
    Article 08 July 2024
  11. Granular Syntax Processing with Multi-Task and Curriculum Learning

    Syntactic processing techniques are the foundation of natural language processing (NLP), supporting many downstream NLP tasks. In this paper, we...

    Xulang Zhang, Rui Mao, Erik Cambria in Cognitive Computation
    Article 08 July 2024
  12. CSSLnO: Cat Swarm Sea Lion Optimization-based deep learning for fake news detection from social media

    Social media has effectively shortened the time for the distribution of information, which sometimes carry news when compared to traditional methods....

    Kanthi Kiran Sirra, Shashi Mogalla, Kandalam Basamma Madhuri in International Journal of Information Technology
    Article 07 July 2024
  13. A fast verifiable fully homomorphic encryption technique for secret computation on cloud data

    In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in International Journal of Information Technology
    Article 07 July 2024
  14. Twin Bounded Support Vector Machine with Capped Pinball Loss

    In order to obtain a more robust and sparse classifier, in this paper, we propose a novel classifier termed as twin bounded support vector machine...

    Huiru Wang, **aoqing Hong, Siyuan Zhang in Cognitive Computation
    Article 06 July 2024
  15. A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks

    Crowdsourcing is a powerful technique for accomplishing tasks that are difficult for machines but easy for humans. However, ensuring the quality of...

    Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh in Computing
    Article 06 July 2024
  16. Prescribed-Time Sampled-Data Control for the Bipartite Consensus of Linear Multi-Agent Systems in Singed Networks

    This article examines the prescribed-time sampled-data control problem for multi-agent systems in signed networks. A time-varying high gain-based...

    Mengke Liu, Wenbing Zhang, Guanglei Wu in Cognitive Computation
    Article 06 July 2024
  17. Modelling the quantification of requirements technical debt

    Requirements Technical Debt (RTD) applies the Technical Debt (TD) metaphor to capture the consequences of sub-optimal decisions made concerning...

    Judith Perera, Ewan Tempero, ... Kelly Blincoe in Requirements Engineering
    Article Open access 06 July 2024
  18. Integrated feature selection and ensemble learning for heart disease detection: a 2-tier approach with ALAN and ET-ABDF machine learning model

    The findings of this investigation give a novel approach to the forecasting of heart disease. For the purpose of determining significant features, it...

    Aruna Mandula, Baby Shalini Vijaya Kumar in International Journal of Information Technology
    Article 05 July 2024
  19. Pruning Deep Neural Networks for Green Energy-Efficient Models: A Survey

    Over the past few years, larger and deeper neural network models, particularly convolutional neural networks (CNNs), have consistently advanced...

    Jihene Tmamna, Emna Ben Ayed, ... Mounir Ben Ayed in Cognitive Computation
    Article 05 July 2024
  20. “Solar synergy: maximizing photovoltaic power with spotted hyena method in uniform and partial-shade environmental conditions”

    A novel bioinspired Spotted-Hyena Method (SH) is proposed to track the maximum power point of partially shaded photovoltaic arrays. The SH algorithm...

    Saurabh Pandey, Manish Kumar Srivastava in International Journal of Information Technology
    Article 05 July 2024
Did you find what you were looking for? Share feedback.