Results 51 to 60 of about 7,837 (220)
ABSTRACT Software fault prediction (SFP) plays a crucial role in modern software development by enabling early identification of fault‐prone modules and efficient allocation of testing resources. While deep learning approaches have shown promise in this domain, challenges persist regarding architectural choices, metric selection, and class imbalance ...
Khoa Phung +2 more
wiley +1 more source
Optimizing CMS build infrastructure via Apache Mesos
The Offline Software of the CMS Experiment at the Large Hadron Collider (LHC) at CERN consists of 6M lines of in-house code, developed over a decade by nearly 1000 physicists, as well as a comparable amount of general use open-source code.
Abdurachmanov, David +5 more
core +1 more source
Design of a Digital Twin System for Deepwater Installation Systems
A digital twin‐based system is proposed to enhance the safety and efficiency of deepwater subsea installation by enabling real‐time monitoring, predictive analysis and intelligent decision‐making. The system integrates simulation, sensing and VR interaction to support planning and operations in complex offshore environments.
Song Chen +6 more
wiley +1 more source
A Scalable Data Access Layer to Manage Structured Heterogeneous Biomedical Data. [PDF]
This work presents a scalable data access layer, called PyEHR, designed to support the implementation of data management systems for secondary use of structured heterogeneous biomedical and clinical data.
Giovanni Delussu +3 more
doaj +1 more source
Architecture of the higher vocational English knowledge graph. ABSTRACT Aiming at the problem of insufficient individualization and dynamic demand in higher vocational English learning, this paper proposes a dynamic learning path recommendation method based on real‐time knowledge graph updates.
Fengna Zhang, Xinxin Li
wiley +1 more source
Cyber Threat Intelligence from Honeypot Data Using Elasticsearch [PDF]
Cyber attacks are increasing in every aspect of daily life. There are a number of different technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), firewalls, switches, routers etc., which are active round the clock. These systems generate alerts and prevent cyber attacks.
Al-Mohannadi, Hamad +5 more
openaire +2 more sources
A Farm‐To‐Fork Framework to Assess the Scope and Limitations of Agricultural Data Structures
The diagram illustrates the agricultural data structures evaluation process using AgrIMAF. The data structures were gathered from the literature and ranged from data models and conceptual frameworks to file‐based systems and databases. They are then systematically analysed through the AgrIMAF structure, which consists of three layers, that is, the ...
Cheikh M. M. Thiaw +4 more
wiley +1 more source
Objective. When integrating the ELK stack into an information system, it is necessary to have a duplicate Java application in a closed circuit for hidden anomaly processing.
P. I. Sharikov +2 more
doaj +1 more source
Large Elasticsearch cluster management
The Centralised Elasticsearch Service at CERN runs the infrastructure to provide Elasticsearch clusters for more than 100 different use cases. This contribution presents how the infrastructure is managed, covering the resource distribution, instance creation, cluster monitoring and user support.
Saiz, Pablo, Schwickerath, Ulrich
openaire +1 more source
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source

