We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  2. Federated learning for digital healthcare: concepts, applications, frameworks, and challenges

    Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...

    D. N. Sachin, B. Annappa, Sateesh Ambesange in Computing
    Article 10 July 2024
  3. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  4. Unveiling the impact of employee-customer familiarity on customer purchase intentions: an empirical investigation within the realm of web-based date analytics

    This research delves into the intricate dynamics of employee-customer familiarity and its profound influence on customer purchase intentions within...

    Bingfeng Li, **aoting **e, ... Shilei Tan in World Wide Web
    Article 10 July 2024
  5. Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements

    Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...

    Claudia Negri-Ribalta, Marius Lombard-Platet, Camille Salinesi in Requirements Engineering
    Article Open access 10 July 2024
  6. MIM: A multiple integration model for intrusion detection on imbalanced samples

    The quantity of normal samples is commonly significantly greater than that of malicious samples, resulting in an imbalance in network security data....

    Zhiqiang Zhang, Le Wang, ... Yanchun Zhang in World Wide Web
    Article 10 July 2024
  7. Signal processing implementation of low-cost target speed detection of CW radar using FPGA

    The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...

    Sameh G. Salem, Mohamed El Hosseny in International Journal of Information Technology
    Article Open access 10 July 2024
  8. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  9. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  10. A robust method for malware analysis using stacking classifiers and dendrogram visualization

    Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...

    N. Naveen Kumar, S. Balamurugan, ... P. Seshu Kumar in International Journal of Information Technology
    Article 09 July 2024
  11. A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification

    Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc....

    Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh in Cluster Computing
    Article 09 July 2024
  12. iDOCEM

    In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...

    Charlotte Verbruggen, Alexandre Goossens, ... Monique Snoeck in Software and Systems Modeling
    Article 09 July 2024
  13. Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions

    There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...

    Jobin Thomas, Murali Parameswaran in International Journal of Information Technology
    Article 09 July 2024
  14. Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method

    The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...

    David Leonardo Mancipe-Huérfano, Rafael Guillermo García-Cáceres in International Journal of Information Technology
    Article Open access 09 July 2024
  15. What you see is what you trace: a two-stage interview study on traceability practices and eye tracking potential

    The benefits of traceability have widely been discussed in research. However, studies have also shown that traceability practices are still not...

    Maike Ahrens, Lukas Nagel, Kurt Schneider in Requirements Engineering
    Article Open access 09 July 2024
  16. Requirements for modelling tools for teaching

    Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...

    Jörg Kienzle, Steffen Zschaler, ... Sofia Meacham in Software and Systems Modeling
    Article Open access 09 July 2024
  17. Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring

    Predictive monitoring is a subfield of process mining that aims to predict how a running case will unfold in the future. One of its main challenges...

    Efrén Rama-Maneiro, Juan C. Vidal, ... Pablo Monteagudo-Lago in Computing
    Article 09 July 2024
  18. Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism

    Crop diseases are among the major natural disasters in agricultural production that seriously restrict the growth and development of crops,...

    Yifu Zhang, Qian Sun, ... Huini Zhou in Computing
    Article 08 July 2024
  19. ASDMG: business topic clustering-based architecture smell detection for microservice granularity

    Microservices architecture smells can significantly affect the quality of microservices due to poor design decisions, especially the granularity...

    Sixuan Wang, Baoqing **, ... Shuhan Cheng in Software Quality Journal
    Article 08 July 2024
  20. A splash of color: a dual dive into the effects of EVO on decision-making with goal models

    Recent approaches have investigated assisting users in making early trade-off decisions when the future evolution of project elements is uncertain....

    Yesugen Baatartogtokh, Irene Foster, Alicia M. Grubb in Requirements Engineering
    Article 08 July 2024
Did you find what you were looking for? Share feedback.