Results 71 to 80 of about 7,309 (206)

Optimizing CMS build infrastructure via Apache Mesos

open access: yes, 2015
The Offline Software of the CMS Experiment at the Large Hadron Collider (LHC) at CERN consists of 6M lines of in-house code, developed over a decade by nearly 1000 physicists, as well as a comparable amount of general use open-source code.
Abdurachmanov, David   +5 more
core   +1 more source

Guardians of the Network: An Ensemble Learning Framework With Adversarial Alignment for Evasive Cyber Threat Detection

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin   +2 more
wiley   +1 more source

DESIGN AND IMPLEMENTATION OF AN INTELLIGENT SEARCH SYSTEM BASED ON NEURAL NETWORKS

open access: yesЕлектроніка та інформаційні технології
Background. In the digital information era, the ability to retrieve relevant data quickly and accurately is increasingly critical. Traditional search engines such as Google or Bing rely on keyword matching, which can fail in cases of vague queries ...
Vitalii Bozhovskiy, Halyna Klym
doaj   +1 more source

Microservices Architecture Enables DevOps: an Experience Report on Migration to a Cloud-Native Architecture [PDF]

open access: yes, 2016
This article reports on experiences and lessons learned during incremental migration and architectural refactoring of a commercial mobile back end as a service to microservices architecture.
Balalaie, A   +2 more
core   +1 more source

Using Elasticsearch for entity recognition in affiliation disambiguation

open access: yes, 2021
Automatic recognition of affiliations in the metadata of scholarly publications is a key point for monitoring and analyzing trends in scientific production, especially in an open science context. We propose an automatic alignment method on registries, based on Elasticsearch. The proposed method is modular and leaves the choice of the alignment criteria
L'Hôte, Anne, Jeangirard, Eric
openaire   +2 more sources

Analyzing the Utility of Openalex to Identify Studies for Systematic Reviews: Methods and a Case Study

open access: yesCochrane Evidence Synthesis and Methods, Volume 3, Issue 4, July 2025.
ABSTRACT Open access scholarly resources have potential to simplify the literature search process, support more equitable access to research knowledge, and reduce biases from lack of access to relevant literature. OpenAlex is the world's largest open access database of academic research.
Claire Stansfield   +4 more
wiley   +1 more source

A Scalable Data Access Layer to Manage Structured Heterogeneous Biomedical Data. [PDF]

open access: yesPLoS ONE, 2016
This work presents a scalable data access layer, called PyEHR, designed to support the implementation of data management systems for secondary use of structured heterogeneous biomedical and clinical data.
Giovanni Delussu   +3 more
doaj   +1 more source

Sustainable Portfolio Construction via Machine Learning: ESG, SDG and Sentiment

open access: yesEuropean Financial Management, Volume 31, Issue 3, Page 1148-1169, June 2025.
ABSTRACT This study proposes portfolio construction strategies based on novel sentiment, ESG and SDG scores. We utilize natural language processing to establish a novel daily score system that mitigates concerns of different rating standards. The portfolios constructed are optimized via machine learning algorithms on a monthly basis using daily ...
Xin Feng   +3 more
wiley   +1 more source

Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. When integrating the ELK stack into an information system, it is necessary to have a duplicate Java application in a closed circuit for hidden anomaly processing.
P. I. Sharikov   +2 more
doaj   +1 more source

Search Multiple Types of Research Assets From Jupyter Notebook

open access: yesSoftware: Practice and Experience, Volume 55, Issue 5, Page 946-965, May 2025.
ABSTRACT Objective Data science and machine learning methodologies are essential to address complex scientific challenges across various domains. These advancements generate numerous research assets such as datasets, software tools, and workflows, which are shared within the open science community. Concurrently, computational notebook environments like
Na Li, Siamak Farshidi, Zhiming Zhao
wiley   +1 more source

Home - About - Disclaimer - Privacy