We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  2. iDOCEM

    In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...

    Charlotte Verbruggen, Alexandre Goossens, ... Monique Snoeck in Software and Systems Modeling
    Article 09 July 2024
  3. A robust method for malware analysis using stacking classifiers and dendrogram visualization

    Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...

    N. Naveen Kumar, S. Balamurugan, ... P. Seshu Kumar in International Journal of Information Technology
    Article 09 July 2024
  4. Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method

    The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...

    David Leonardo Mancipe-Huérfano, Rafael Guillermo García-Cáceres in International Journal of Information Technology
    Article Open access 09 July 2024
  5. Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions

    There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...

    Jobin Thomas, Murali Parameswaran in International Journal of Information Technology
    Article 09 July 2024
  6. Requirements for modelling tools for teaching

    Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...

    Jörg Kienzle, Steffen Zschaler, ... Sofia Meacham in Software and Systems Modeling
    Article Open access 09 July 2024
  7. What you see is what you trace: a two-stage interview study on traceability practices and eye tracking potential

    The benefits of traceability have widely been discussed in research. However, studies have also shown that traceability practices are still not...

    Maike Ahrens, Lukas Nagel, Kurt Schneider in Requirements Engineering
    Article Open access 09 July 2024
  8. Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring

    Predictive monitoring is a subfield of process mining that aims to predict how a running case will unfold in the future. One of its main challenges...

    Efrén Rama-Maneiro, Juan C. Vidal, ... Pablo Monteagudo-Lago in Computing
    Article 09 July 2024
  9. Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism

    Crop diseases are among the major natural disasters in agricultural production that seriously restrict the growth and development of crops,...

    Yifu Zhang, Qian Sun, ... Huini Zhou in Computing
    Article 08 July 2024
  10. A splash of color: a dual dive into the effects of EVO on decision-making with goal models

    Recent approaches have investigated assisting users in making early trade-off decisions when the future evolution of project elements is uncertain....

    Yesugen Baatartogtokh, Irene Foster, Alicia M. Grubb in Requirements Engineering
    Article 08 July 2024
  11. Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model

    One of the preconditions for efficient cloud computing services is the continuous availability of services to clients. However, there are various...

    Raseena M. Haris, Mahmoud Barhamgi, ... Khaled M. Khan in Computing
    Article Open access 08 July 2024
  12. Detecting mistakes in a domain model: a comparison of three approaches

    Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...

    Prabhsimran Singh, Younes Boubekeur, Gunter Mussbacher in Innovations in Systems and Software Engineering
    Article 08 July 2024
  13. CSSLnO: Cat Swarm Sea Lion Optimization-based deep learning for fake news detection from social media

    Social media has effectively shortened the time for the distribution of information, which sometimes carry news when compared to traditional methods....

    Kanthi Kiran Sirra, Shashi Mogalla, Kandalam Basamma Madhuri in International Journal of Information Technology
    Article 07 July 2024
  14. A fast verifiable fully homomorphic encryption technique for secret computation on cloud data

    In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in International Journal of Information Technology
    Article 07 July 2024
  15. A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks

    Crowdsourcing is a powerful technique for accomplishing tasks that are difficult for machines but easy for humans. However, ensuring the quality of...

    Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh in Computing
    Article 06 July 2024
  16. Modelling the quantification of requirements technical debt

    Requirements Technical Debt (RTD) applies the Technical Debt (TD) metaphor to capture the consequences of sub-optimal decisions made concerning...

    Judith Perera, Ewan Tempero, ... Kelly Blincoe in Requirements Engineering
    Article Open access 06 July 2024
  17. Integrated feature selection and ensemble learning for heart disease detection: a 2-tier approach with ALAN and ET-ABDF machine learning model

    The findings of this investigation give a novel approach to the forecasting of heart disease. For the purpose of determining significant features, it...

    Aruna Mandula, Baby Shalini Vijaya Kumar in International Journal of Information Technology
    Article 05 July 2024
  18. “Solar synergy: maximizing photovoltaic power with spotted hyena method in uniform and partial-shade environmental conditions”

    A novel bioinspired Spotted-Hyena Method (SH) is proposed to track the maximum power point of partially shaded photovoltaic arrays. The SH algorithm...

    Saurabh Pandey, Manish Kumar Srivastava in International Journal of Information Technology
    Article 05 July 2024
  19. Lattice-based device-to-device authentication and key exchange protocol for IoT system

    Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices...

    Article 05 July 2024
Did you find what you were looking for? Share feedback.