|
|
|
Suhee Jo, Ryeonggu Kwon and Gihwon Kwon
GitHub serves as a platform for collaborative software development, where contributors engage, evolve projects, and shape the community. This study presents a novel approach to analyzing GitHub activity that departs from traditional methods. Using Discre...
ver más
|
|
|
|
|
|
|
Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova and Andrey Chechulin
This paper aims to test the hypothesis that the quality of social media bot detection systems based on supervised machine learning may not be as accurate as researchers claim, given that bots have become increasingly sophisticated, making it difficult fo...
ver más
|
|
|
|
|
|
|
Leon Kopitar, Iztok Fister, Jr. and Gregor Stiglic
Introduction: Type 2 diabetes mellitus is a major global health concern, but interpreting machine learning models for diagnosis remains challenging. This study investigates combining association rule mining with advanced natural language processing to im...
ver más
|
|
|
|
|
|
|
Paolo Ciancarini, Raffaele Giancarlo and Gennaro Grimaudo
Digital transformation in the public sector provides digital services to the citizens aiming at increasing their quality of life, as well as the transparency and accountability of a public administration. Since adaptation to the citizens changing needs i...
ver más
|
|
|
|
|
|
|
Baskhad Idrisov and Tim Schlippe
Our paper compares the correctness, efficiency, and maintainability of human-generated and AI-generated program code. For that, we analyzed the computational resources of AI- and human-generated program code using metrics such as time and space complexit...
ver más
|
|
|
|
|
|
|
Danilo Pau, Andrea Pisani and Antonio Candelieri
In the context of TinyML, many research efforts have been devoted to designing forward topologies to support On-Device Learning. Reaching this target would bring numerous advantages, including reductions in latency and computational complexity, stronger ...
ver más
|
|
|
|
|
|
|
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma...
ver más
|
|
|
|
|
|
|
Saida Mussakhojayeva, Kaisar Dauletbek, Rustem Yeshpanov and Huseyin Atakan Varol
The primary aim of this study was to contribute to the development of multilingual automatic speech recognition for lower-resourced Turkic languages. Ten languages?Azerbaijani, Bashkir, Chuvash, Kazakh, Kyrgyz, Sakha, Tatar, Turkish, Uyghur, and Uzbek?we...
ver más
|
|
|
|
|
|
|
Bikram Pratim Bhuyan, Vaishnavi Jaiswal and Amar Ramdane Cherif
Investors at well-known firms are increasingly becoming interested in stock forecasting as they seek more effective methods to predict market behavior using behavioral finance tools. Accordingly, studies aimed at predicting stock performance are gaining ...
ver más
|
|
|
|
|
|
|
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me...
ver más
|
|
|
|