Search
Search Results
-
VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier
A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...
-
Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...
-
Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...
-
Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling
The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...
-
Software verification challenges in the blockchain ecosystem
Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...
-
Intelligent Personality Assessment and Verification from Handwriting using Machine Learning
It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...
-
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges
Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...
-
Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements
Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...
-
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...
-
Signal processing implementation of low-cost target speed detection of CW radar using FPGA
The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...
-
A robust method for malware analysis using stacking classifiers and dendrogram visualization
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...
-
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...
-
iDOCEM
In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...
-
Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method
The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...
-
Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions
There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...
-
Requirements for modelling tools for teaching
Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...
-
Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation
Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...
-
Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring
Predictive monitoring is a subfield of process mining that aims to predict how a running case will unfold in the future. One of its main challenges...