- Advanced Database Systems and Queries
- Semantic Web and Ontologies
- Service-Oriented Architecture and Web Services
- Data Management and Algorithms
- Data Mining Algorithms and Applications
- Data Quality and Management
- Distributed and Parallel Computing Systems
- Business Process Modeling and Analysis
- Big Data and Business Intelligence
- Scientific Computing and Data Management
- Peer-to-Peer Network Technologies
- Advanced Computational Techniques and Applications
- Information and Cyber Security
- Personal Information Management and User Behavior
- Access Control and Trust
- Digital Marketing and Social Media
- Web Data Mining and Analysis
- Privacy, Security, and Data Protection
- Distributed systems and fault tolerance
- Advanced Data Storage Technologies
- Mobile Agent-Based Network Management
- AI-based Problem Solving and Planning
- Image Retrieval and Classification Techniques
- ERP Systems Implementation and Impact
- Software Engineering Techniques and Practices
TU Wien
2016-2025
University of Vienna
2004-2024
Tadulako University
2009-2023
Telkom University
2023
Binus University
2023
Bandung Institute of Technology
2023
SBA Research
2006-2023
Software Competence Center Hagenberg (Austria)
2019-2020
Software (Spain)
2019
Algebra University College
2019
Abstract Agroforestry systems may play a critical role in reducing the vulnerability of farmers' livelihood to droughts as tree‐based provide several mechanisms that can mitigate impacts from extreme weather events. Here, we use replicated throughfall reduction experiment study drought response cacao/ Gliricidia stand over 13‐month period. Soil water content was successfully reduced down soil depth at least 2.5 m. Contrary our expectations measured only relatively small nonsignificant...
In supply chain management (SCM), two topics have gained importance over the last years. On one hand, sustainable SCM (SSCM) has become increasingly relevant and many publications contributed to topic. other information technology (IT) is being progressively considered as a key enabler for efficiency in chains. Several research efforts field of IT SSCM. However, this paper first recent attempt summarise current state art how can affect SSCM any structured way compare it with 'general' give...
Abstract The prolonged sitting inherent in modern work and study environments poses significant health risks, necessitating effective monitoring solutions. Traditional human activity recognition systems often fall short these contexts owing to their reliance on structured data, which may fail capture the complexity of movements or accommodate incomplete unstructured nature healthcare data. To address this gap, our introduces a novel application graph neural networks (GNNs) for detecting...
Extracting features from the colonoscopic images is essential for getting features, which characterizes properties of colon. The are employed in computer-assisted diagnosis to assist physician detecting colon status.Endoscopic contain rich texture and color information. Novel schemes developed extract new spectra chromatic achromatic domains, a selected region interest each component histogram images. These reduced size using Principal Component Analysis (PCA) evaluated Backpropagation...
Computerized processing of medical images can ease the search representative features in images. The endoscopic possess rich information expressed by texture. Regions affected diseases, such as ulcer or coli, may have different texture features. model implemented this study is Local Binary Pattern (LBP) and a log-likelihood-ratio, called G-statistic, used to evaluate similarity regions based on LBP. neural network classification. SOM BP are applied compared. classification algorithm tested...
The dynamic business environment of many organizations require massive monitoring their processes in real-time order to proactively respond exceptional situations and take advantage time-sensitive opportunities. ability sense interpret events about a changing requires an event-driven IT infrastructure for pwerforming fast well-informed decisions putting them into action. However, traditional Business Intelligence (BI) Data Warehousing technologies do not directly address time sensitive...
Cloud computing introduces a fundamental shift in service delivery. A market registry, flexibility, exchangeability and integration of services are important issues for its success. In this work we introduce unified business ontology with querying capabilities. Our framework addresses two aspects: on the one hand it gives answer to leading question how can structure term (as basic research) enable matching between offered demand. It closes gap summarize describe standardized way. On other...
Privacy requirements engineering acts as a role to systematically elicit privacy from system and legal such the GDPR. Many methodologies have been proposed, but majority of them are focused on waterfall approach, making adopting in agile software development difficult. The other major issue is that process currently high degree manual. This paper focuses closing these gaps through machine learning-based approach for identifying an environment, employing natural language processing (NLP)...
Cloud computing allows delivering information technology power on demand. Be it either the hosting of a certain Web application or outsourcing an entire server data center by means virtualization. Applying these techniques however goes along with handing over ultimate control to third party. This paper investigates Nimbus as cloud resource and shows example implementation for retaining user based virtual machine images encrypted client side. that procedures involved verifying validity...
Bayesian networks are indispensable for determining the probability of events which influenced by various components. probabilities encode degrees belief about certain and a dynamic knowledge body is used to strengthen, update, or weaken these assumptions. The creation requires at least three challenging tasks: (i) determination relevant influence factors, (ii) relationships between identified (iii) calculation conditional tables each node in network.Based on existing domain ontologies, we...