Results 51 to 60 of about 7,837 (220)

Deep Learning Architectures for Software Fault Prediction: The Impact of Error‐Type Metrics and Class Imbalance

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 1, January 2026.
ABSTRACT Software fault prediction (SFP) plays a crucial role in modern software development by enabling early identification of fault‐prone modules and efficient allocation of testing resources. While deep learning approaches have shown promise in this domain, challenges persist regarding architectural choices, metric selection, and class imbalance ...
Khoa Phung   +2 more
wiley   +1 more source

Optimizing CMS build infrastructure via Apache Mesos

open access: yes, 2015
The Offline Software of the CMS Experiment at the Large Hadron Collider (LHC) at CERN consists of 6M lines of in-house code, developed over a decade by nearly 1000 physicists, as well as a comparable amount of general use open-source code.
Abdurachmanov, David   +5 more
core   +1 more source

Design of a Digital Twin System for Deepwater Installation Systems

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
A digital twin‐based system is proposed to enhance the safety and efficiency of deepwater subsea installation by enabling real‐time monitoring, predictive analysis and intelligent decision‐making. The system integrates simulation, sensing and VR interaction to support planning and operations in complex offshore environments.
Song Chen   +6 more
wiley   +1 more source

A Scalable Data Access Layer to Manage Structured Heterogeneous Biomedical Data. [PDF]

open access: yesPLoS ONE, 2016
This work presents a scalable data access layer, called PyEHR, designed to support the implementation of data management systems for secondary use of structured heterogeneous biomedical and clinical data.
Giovanni Delussu   +3 more
doaj   +1 more source

Dynamic Recommendation System for Higher Vocational English Learning Paths Based on Real‐Time Knowledge Graph Update

open access: yesEngineering Reports, Volume 7, Issue 12, December 2025.
Architecture of the higher vocational English knowledge graph. ABSTRACT Aiming at the problem of insufficient individualization and dynamic demand in higher vocational English learning, this paper proposes a dynamic learning path recommendation method based on real‐time knowledge graph updates.
Fengna Zhang, Xinxin Li
wiley   +1 more source

Cyber Threat Intelligence from Honeypot Data Using Elasticsearch [PDF]

open access: yes2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), 2018
Cyber attacks are increasing in every aspect of daily life. There are a number of different technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), firewalls, switches, routers etc., which are active round the clock. These systems generate alerts and prevent cyber attacks.
Al-Mohannadi, Hamad   +5 more
openaire   +2 more sources

A Farm‐To‐Fork Framework to Assess the Scope and Limitations of Agricultural Data Structures

open access: yesModern Agriculture, Volume 3, Issue 2, December 2025.
The diagram illustrates the agricultural data structures evaluation process using AgrIMAF. The data structures were gathered from the literature and ranged from data models and conceptual frameworks to file‐based systems and databases. They are then systematically analysed through the AgrIMAF structure, which consists of three layers, that is, the ...
Cheikh M. M. Thiaw   +4 more
wiley   +1 more source

Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. When integrating the ELK stack into an information system, it is necessary to have a duplicate Java application in a closed circuit for hidden anomaly processing.
P. I. Sharikov   +2 more
doaj   +1 more source

Large Elasticsearch cluster management

open access: yes, 2019
The Centralised Elasticsearch Service at CERN runs the infrastructure to provide Elasticsearch clusters for more than 100 different use cases. This contribution presents how the infrastructure is managed, covering the resource distribution, instance creation, cluster monitoring and user support.
Saiz, Pablo, Schwickerath, Ulrich
openaire   +1 more source

Guardians of the Network: An Ensemble Learning Framework With Adversarial Alignment for Evasive Cyber Threat Detection

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy