We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm

    In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...

    Voore Subba Rao, G. Ravindra Babu in International Journal of Information Technology
    Article 02 July 2024
  2. Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to...

    Jiangang Hou, **n Li, ... Changzhen Hu in Computing
    Article 02 July 2024
  3. A novel approach to detect, analyze and block adversarial web pages

    The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with...

    M. Ranjith Kumar, Darshana A. Naik, ... C. V. Guru Rao in International Journal of Information Technology
    Article 02 July 2024
  4. Detecting review fraud using metaheuristic graph neural networks

    Although online reviews play a critical role in sha** consumer behavior and establishing institutional trust, this reliance on online reviews has...

    Article Open access 02 July 2024
  5. Analysis of channel capacity for UWB antenna for improvements in the data rates and low Power transmission over wireless application

    Multiple input- Multiple output- Ultra-wideband (MIMO-UWB) is a wireless communication approach that combines multiple antennas at the transmitter...

    Nitin I. Bhopale, Sunil N. Pawar in International Journal of Information Technology
    Article 02 July 2024
  6. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

    Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...

    Rachana Y. Patil, Arijit Karati, Yogesh H. Patil in International Journal of Information Technology
    Article 02 July 2024
  7. REDQT: a method for automated mobile application GUI testing based on deep reinforcement learning algorithms

    As mobile applications become increasingly prevalent in daily life, the demand for their functionality and reliability continues to grow. Traditional...

    Fengyu Wang, Chuanqi Tao, Jerry Gao in Service Oriented Computing and Applications
    Article 01 July 2024
  8. Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis

    Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...

    Article 01 July 2024
  9. An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network

    Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...

    Rasmita Jena, Ram Chandra Barik, ... Saroj Pradhan in International Journal of Information Technology
    Article 01 July 2024
  10. Advancing personal identity verification by integrating facial recognition through deep learning algorithms

    This research delves into the realm of facial recognition technology, leveraging the power of convolutional neural network (CNN) to enhance personal...

    Article 01 July 2024
  11. An optimal feature subset selection technique to improve accounting information security for intrusion detection systems

    The goal of an intrusion detection system (IDS) is to secure data on the network by monitoring the flow of traffic and identifying malicious users....

    Ameer Saheb Shaker, Atheer Alkhafaji, ... Ahmed Jassim Al-Yasiri in International Journal of Information Technology
    Article 01 July 2024
  12. Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles

    The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has...

    Selcuk Aslan in Computing
    Article Open access 01 July 2024
  13. A novel IMW-mrmr feature selection approach for early detection of hypertension with HRV analysis

    In the absence of control measures, hypertension poses a major threat to the world’s population’s health and can quickly develop into vascular...

    A. R. Sohara Banu, V. Nagaveni in International Journal of Information Technology
    Article 01 July 2024
  14. An empirical cryptocurrency price forecasting model

    The goal of this manuscript is to use deep learning based multi-modal hybrid model to forecast the value of bitcoins by analyzing the influence of...

    Abdalabbas Hassan Kadhim, Dawood Salman Al Farttoosi, ... Akeel Hamza Almagtome in International Journal of Information Technology
    Article 01 July 2024
  15. Automated generation of smart contract code from legal contract specifications with Symboleo2SC

    Smart contracts (SCs) are software systems that monitor and partially control the execution of legal contracts to ensure compliance with the...

    Aidin Rasti, Amal Ahmed Anda, ... John Mylopoulos in Software and Systems Modeling
    Article 29 June 2024
  16. Analyzing psychological information using lattice hydrodynamic model coupled with electronic throttle control

    Electronic throttle control (ETC), a mechanism for precise regulation of engine power and torque production, is a typical component in modern...

    Meenakshi Mehra, Vikash Siwach, ... Poonam Redhu in International Journal of Information Technology
    Article 28 June 2024
  17. Secure SSI framework using the optimized Orkey identity schema

    In the era of digital transformation and increasing concerns regarding data privacy, the concept of Self-Sovereign Identity (SSI) has attained...

    K. Pandu N., A. Sasi Kumar in International Journal of Information Technology
    Article 28 June 2024
  18. Human factors in model-driven engineering: future research goals and initiatives for MDE

    Software modelling and model-driven engineering (MDE) is traditionally studied from a technical perspective. However, one of the core motivations...

    Grischa Liebel, Jil Klünder, ... Vasco Amaral in Software and Systems Modeling
    Article 28 June 2024
  19. A novel and optimized IoT –ML based plant classification, monitoring and prediction system

    With the increasing demand for modern technologies and automation, there is a need to maintain plants by adopting such modern automated technologies....

    Sukhdeep Kaur, Harishchander Anandaram, ... Gopal Krishna in International Journal of Information Technology
    Article 28 June 2024
  20. Sustainable augmented framework using smart sensors with ATM inspired 5G technologies for enterprise networks

    The primary driving force behind the development of fifth-generation (5G) applications is the necessity of Concurrent Multipath Transfer (CMT)....

    Shivakumar Kagi, Anita Venugopal, ... Abhishek MB in International Journal of Information Technology
    Article 27 June 2024
Did you find what you were looking for? Share feedback.