Search
Search Results
-
Global adaptive histogram feature network for automatic segmentation of infection regions in CT images
Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...
-
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges
Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...
-
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...
-
Unveiling the impact of employee-customer familiarity on customer purchase intentions: an empirical investigation within the realm of web-based date analytics
This research delves into the intricate dynamics of employee-customer familiarity and its profound influence on customer purchase intentions within...
-
Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements
Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...
-
MIM: A multiple integration model for intrusion detection on imbalanced samples
The quantity of normal samples is commonly significantly greater than that of malicious samples, resulting in an imbalance in network security data....
-
Signal processing implementation of low-cost target speed detection of CW radar using FPGA
The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....
-
A robust method for malware analysis using stacking classifiers and dendrogram visualization
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...
-
A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification
Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc....
-
iDOCEM
In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...
-
Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions
There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...
-
Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method
The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...
-
What you see is what you trace: a two-stage interview study on traceability practices and eye tracking potential
The benefits of traceability have widely been discussed in research. However, studies have also shown that traceability practices are still not...
-
Requirements for modelling tools for teaching
Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...
-
Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring
Predictive monitoring is a subfield of process mining that aims to predict how a running case will unfold in the future. One of its main challenges...
-
Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism
Crop diseases are among the major natural disasters in agricultural production that seriously restrict the growth and development of crops,...
-
ASDMG: business topic clustering-based architecture smell detection for microservice granularity
Microservices architecture smells can significantly affect the quality of microservices due to poor design decisions, especially the granularity...
-
A splash of color: a dual dive into the effects of EVO on decision-making with goal models
Recent approaches have investigated assisting users in making early trade-off decisions when the future evolution of project elements is uncertain....