We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model

    In the IIoT, billions of devices continually provide information that is extremely diverse, variable, and large-scale and presents significant...

    Sangeeta Sharma, Priyanka Verma, ... Rakesh Porika in Cluster Computing
    Article 04 July 2024
  2. Nature inspired recommendation with path optimization for online social network communities

    Human sentiment prevalent in online dialogues largely governs the formation of communities in online social networks. These recommendation methods...

    Mansi Goel, Adwitiya Sinha in International Journal of Information Technology
    Article 04 July 2024
  3. FEF-Net: feature enhanced fusion network with crossmodal attention for multimodal humor prediction

    Humor segment prediction in video involves the comprehension and analysis of humor. Traditional humor prediction has been text-based; however, with...

    Peng Gao, Chuanqi Tao, Donghai Guan in Multimedia Systems
    Article 04 July 2024
  4. SymboleoPC: checking properties of legal contracts

    Legal contracts specify requirements for business transactions. Symboleo was recently proposed as a formal specification language for legal...

    Alireza Parvizimosaed, Marco Roveri, ... John Mylopoulos in Software and Systems Modeling
    Article 03 July 2024
  5. Guest editorial to the special section on PoEM’2022

    This guest editorial presents the papers contributing to the 15th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2022)....

    Balbir S. Barn, Kurt Sandkuhl, ... Tony Clark in Software and Systems Modeling
    Article 03 July 2024
  6. Exploring behaviours of RESTful APIs in an industrial setting

    A common way of exposing functionality in contemporary systems is by providing a Web-API based on the REST API architectural guidelines. To describe...

    Stefan Karlsson, Robbert Jongeling, ... Daniel Sundmark in Software Quality Journal
    Article Open access 03 July 2024
  7. Transfer learning for emotion detection in conversational text: a hybrid deep learning approach with pre-trained embeddings

    Understanding the emotions and sentiments from conversations has relevance in many application areas. Specifically, conversational agents,...

    Sheetal Kusal, Shruti Patil, ... Deepali Vora in International Journal of Information Technology
    Article 03 July 2024
  8. Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure

    In edge computing, repetitive computations are a common occurrence. However, the traditional TCP/IP architecture used in edge computing fails to...

    Atiyeh Javaheri, Ali Bohlooli, Kamal Jamshidi in Computing
    Article 03 July 2024
  9. Integrated multi-view modeling for reliable machine learning-intensive software engineering

    Development of machine learning (ML) systems differs from traditional approaches. The probabilistic nature of ML leads to a more experimentative...

    Jati H. Husen, Hironori Washizaki, ... Hironori Takeuchi in Software Quality Journal
    Article Open access 03 July 2024
  10. A comparative study of software defect binomial classification prediction models based on machine learning

    As information technology continues to advance, software applications are becoming increasingly critical. However, the growing size and complexity of...

    Hongwei Tao, **aoxu Niu, ... Yang **an in Software Quality Journal
    Article 03 July 2024
  11. Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features

    Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to...

    Yahya Tashtoush, Moayyad Alajlouni, ... Omar Darwish in Cluster Computing
    Article 03 July 2024
  12. Empowering e-learning approach by the use of federated edge computing

    Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires...

    Nouha Arfaoui, Amel Ksibi, ... Ridha Ejbali in Cluster Computing
    Article 03 July 2024
  13. Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain

    The adoption of Smart Contracts has revolutionized industries like DeFi and supply chain management, streamlining processes and enhancing...

    Samia El Haddouti, Mohammed Khaldoune, ... Mohamed Dafir Ech-Cherif El Kettani in Computing
    Article 03 July 2024
  14. A channel-gained single-model network with variable rate for multispectral image compression in UAV air-to-ground remote sensing

    Unmanned aerial vehicle (UAV) air-to-ground remote sensing technology, has the advantages of long flight duration, real-time image transmission, wide...

    Wei Wang, Daiyin Zhu, Kedi Hu in Multimedia Systems
    Article 02 July 2024
  15. Efficient base station deployment in specialized regions with splitting particle swarm optimization algorithm

    Signal coverage quality and intensity distribution in complex environments pose a critical challenge, particularly evident in high-density personnel...

    Jiaying Shen, Donglin Zhu, ... Shi Cheng in World Wide Web
    Article 02 July 2024
  16. Delineation of ECG waveform components using encoder-decoder architecture with Postprocess algorithm

    With the exponential increase in heart disease cases, it is essential to construct models (algorithms) that can be used to delineate...

    Deepti Sharma, Narendra Kohli in International Journal of Information Technology
    Article 02 July 2024
  17. Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies

    Deploying virtual machines poses a significant challenge for cloud data centers, requiring careful consideration of various objectives such as...

    Arezoo Ghasemi, Abolfazl Toroghi Haghighat, Amin Keshavarzi in Computing
    Article 02 July 2024
  18. Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics

    Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...

    Yevhenii Shudrenko, Andreas Timm-Giel in Computing
    Article Open access 02 July 2024
  19. Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm

    In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...

    Voore Subba Rao, G. Ravindra Babu in International Journal of Information Technology
    Article 02 July 2024
Did you find what you were looking for? Share feedback.