We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. A hybrid neural network for urban rail transit short-term flow prediction

    Accurate and rapid short-term passenger flow prediction is the foundation for safe and efficient operation of urban rail transit systems. The urban...

    Caihua Zhu, **aoli Sun, ... Yan Li in The Journal of Supercomputing
    Article 03 July 2024
  2. A robust two-step algorithm for community detection based on node similarity

    The rapid development of the internet and social network platforms has given rise to a new field of research, social network analysis. This field of...

    Bilal Lounnas, Makhlouf Benazi, Mohamed Kamel in The Journal of Supercomputing
    Article 03 July 2024
  3. Blind Color Image Watermarking Using Deep Artificial Neural Network Using Statistical Features

    With increasing digital content over the internet it is very important to secure the digital contents in such a way that the identity and integrity...

    Manoj Kumar Pandey, Sushma Jaiswal in SN Computer Science
    Article 03 July 2024
  4. SKGDC: Effective Segmentation Based Deep Learning Methodology for Banana Leaf, Fruit, and Stem Disease Prediction

    In agriculture, detecting plant diseases is crucial for optimal plant growth. Initially, input images are collected from three datasets: banana leaf...

    Sahana Shetty, T. R. Mahesh in SN Computer Science
    Article 03 July 2024
  5. LATA: learning automata-based task assignment on heterogeneous cloud computing platform

    A cloud computing environment is a distributed system where idle resources are accessible across a wide area network, such as the Internet. Due to...

    Soulmaz Gheisari, Hamid ShokrZadeh in The Journal of Supercomputing
    Article Open access 03 July 2024
  6. An Experimental Evaluation of Summarisation-Based Frequent Subgraph Mining for Subgraph Searching

    The subgraph searching is a fundamental operation for the analysis and exploration of graphs. Nowadays, molecular databases are nearing close to one...

    Chimi Wangmo, Lena Wiese in SN Computer Science
    Article Open access 03 July 2024
  7. Predicting Apple Plant Diseases in Orchards Using Machine Learning and Deep Learning Algorithms

    Apple cultivation in the Kashmir Valley is a cornerstone of the region’s agriculture, contributing significantly to the economy through substantial...

    Imtiaz Ahmed, Pramod Kumar Yadav in SN Computer Science
    Article 03 July 2024
  8. A Game-Based Cognitive Intervention for Young Learners with Reading Difficulties

    The study’s primary contribution is a game-based cognitive intervention tool for young learners with reading difficulties. The second contribution is...

    Alexandros Yeratziotis, Thomas Fotiadis, ... Timothy C. Papadopoulos in SN Computer Science
    Article Open access 03 July 2024
  9. Integrated multi-view modeling for reliable machine learning-intensive software engineering

    Development of machine learning (ML) systems differs from traditional approaches. The probabilistic nature of ML leads to a more experimentative...

    Jati H. Husen, Hironori Washizaki, ... Hironori Takeuchi in Software Quality Journal
    Article Open access 03 July 2024
  10. What causes exceptions in machine learning applications? Mining machine learning-related stack traces on Stack Overflow

    Machine learning (ML), including deep learning, has recently gained tremendous popularity in a wide range of applications. However, like traditional...

    Amin Ghadesi, Maxime Lamothe, Heng Li in Empirical Software Engineering
    Article 03 July 2024
  11. Design smells in multi-language systems and bug-proneness: a survival analysis

    Modern applications are often developed using a combination of programming languages and technologies. Multi-language systems offer opportunities for...

    Mouna Abidi, Md Saidur Rahman, ... Foutse Khomh in Empirical Software Engineering
    Article 03 July 2024
  12. A cloud-fog distributed trust service for wireless sensor networks

    In wireless sensor networks (WSNs), data aggregation techniques are used to reduce energy consumption of the sensors and extend the network lifetime....

    Bader A. Ali, Hanady M. Abdulsalam, ... Eman Alroumi in The Journal of Supercomputing
    Article 03 July 2024
  13. A comparative study of software defect binomial classification prediction models based on machine learning

    As information technology continues to advance, software applications are becoming increasingly critical. However, the growing size and complexity of...

    Hongwei Tao, **aoxu Niu, ... Yang **an in Software Quality Journal
    Article 03 July 2024
  14. Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features

    Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to...

    Yahya Tashtoush, Moayyad Alajlouni, ... Omar Darwish in Cluster Computing
    Article 03 July 2024
  15. Empowering e-learning approach by the use of federated edge computing

    Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires...

    Nouha Arfaoui, Amel Ksibi, ... Ridha Ejbali in Cluster Computing
    Article 03 July 2024
  16. Decomposition-based long short-term memory model for price forecasting of agricultural commodities

    Accurate and reliable price forecasting of agricultural commodities is one of the research hotspots, as these prices are inherently complex and...

    Kapil Choudhary, Girish Kumar Jha, ... Rajeev Ranjan Kumar in Iran Journal of Computer Science
    Article 02 July 2024
  17. IoV security and privacy survey: issues, countermeasures, and challenges

    As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...

    Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati in The Journal of Supercomputing
    Article 02 July 2024
  18. Predicting the Acceptance of Metaverse for Educational Purposes in Universities: A Structural Equation Model and Mediation Analysis of the Extended Technology Acceptance Model

    This study investigated factors that predict the acceptance of metaverse applications for educational usage among university students from the facet...

    Mohd Shafie Rosli, Nor Shela Saleh in SN Computer Science
    Article 02 July 2024
  19. Hardware architecture and memristor-crossbar implementation of type-2 fuzzy system with type reduction and in-situ training

    The Type-2 fuzzy set is a fuzzy set with fuzzy membership degrees. This set is used when accurately determining the membership degree of a fuzzy set...

    Sajad Haghzad Klidbary, Mohammad Javadian in The Journal of Supercomputing
    Article 02 July 2024
  20. Proteo: a framework for the generation and evaluation of malleable MPI applications

    Applying malleability to HPC systems can increase their productivity without degrading or even improving the performance of running applications....

    Iker Martín-Álvarez, José I. Aliaga, ... Sergio Iserte in The Journal of Supercomputing
    Article Open access 02 July 2024
Did you find what you were looking for? Share feedback.