Search
Search Results
-
PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model
In the IIoT, billions of devices continually provide information that is extremely diverse, variable, and large-scale and presents significant...
-
Nature inspired recommendation with path optimization for online social network communities
Human sentiment prevalent in online dialogues largely governs the formation of communities in online social networks. These recommendation methods...
-
FEF-Net: feature enhanced fusion network with crossmodal attention for multimodal humor prediction
Humor segment prediction in video involves the comprehension and analysis of humor. Traditional humor prediction has been text-based; however, with...
-
SymboleoPC: checking properties of legal contracts
Legal contracts specify requirements for business transactions. Symboleo was recently proposed as a formal specification language for legal...
-
Guest editorial to the special section on PoEM’2022
This guest editorial presents the papers contributing to the 15th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2022)....
-
Exploring behaviours of RESTful APIs in an industrial setting
A common way of exposing functionality in contemporary systems is by providing a Web-API based on the REST API architectural guidelines. To describe...
-
Transfer learning for emotion detection in conversational text: a hybrid deep learning approach with pre-trained embeddings
Understanding the emotions and sentiments from conversations has relevance in many application areas. Specifically, conversational agents,...
-
Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure
In edge computing, repetitive computations are a common occurrence. However, the traditional TCP/IP architecture used in edge computing fails to...
-
Integrated multi-view modeling for reliable machine learning-intensive software engineering
Development of machine learning (ML) systems differs from traditional approaches. The probabilistic nature of ML leads to a more experimentative...
-
A comparative study of software defect binomial classification prediction models based on machine learning
As information technology continues to advance, software applications are becoming increasingly critical. However, the growing size and complexity of...
-
Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features
Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to...
-
Empowering e-learning approach by the use of federated edge computing
Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires...
-
Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain
The adoption of Smart Contracts has revolutionized industries like DeFi and supply chain management, streamlining processes and enhancing...
-
A channel-gained single-model network with variable rate for multispectral image compression in UAV air-to-ground remote sensing
Unmanned aerial vehicle (UAV) air-to-ground remote sensing technology, has the advantages of long flight duration, real-time image transmission, wide...
-
Efficient base station deployment in specialized regions with splitting particle swarm optimization algorithm
Signal coverage quality and intensity distribution in complex environments pose a critical challenge, particularly evident in high-density personnel...
-
Delineation of ECG waveform components using encoder-decoder architecture with Postprocess algorithm
With the exponential increase in heart disease cases, it is essential to construct models (algorithms) that can be used to delineate...
-
Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies
Deploying virtual machines poses a significant challenge for cloud data centers, requiring careful consideration of various objectives such as...
-
Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics
Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...
-
Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm
In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...