We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach

    Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...

    Panagiotis Kouris, Georgios Alexandridis, Andreas Stafylopatis in Journal of Big Data
    Article Open access 14 July 2024
  2. Exploring the dynamics of ICT and globalization on human development in India: asymmetric analysis and policy implications

    The present study examines the asymmetrical relationship among globalization (GLB), information communication and technology (ICT), and human...

    Jancy Phore, Deepa, ... A. K. Saini in International Journal of Information Technology
    Article 14 July 2024
  3. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  4. Application of neural networks to predict indoor air temperature in a building with artificial ventilation: impact of early stop**

    Indoor air temperature prediction can facilitate energy-saving actions without compromising the indoor thermal comfort of occupants. The aim of this...

    Cathy Beljorelle Nguimatio Tsague, Jean Calvin Ndize Seutche, ... René Tchinda in International Journal of Information Technology
    Article 14 July 2024
  5. Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling

    To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...

    Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad in International Journal of Information Technology
    Article 13 July 2024
  6. VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier

    A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...

    A. V. S. S. Varma, Kasiprasad Manepalli in International Journal of Information Technology
    Article 13 July 2024
  7. Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling

    The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...

    N S Koti Mani Kumar Tirumanadham, Thaiyalnayaki S, Sriram M in International Journal of Information Technology
    Article 13 July 2024
  8. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  9. Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application

    Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...

    Subhash Kamble, J. S. Arunalatha, K. R. Venugopal in International Journal of Information Technology
    Article 13 July 2024
  10. Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone

    This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q -ary ( q is even) for all even lengths with a wide...

    Piyush Priyanshu, Subhabrata Paul, Sudhan Majhi in Cryptography and Communications
    Article 12 July 2024
  11. Intelligent Personality Assessment and Verification from Handwriting using Machine Learning

    It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as...

    Pradeep Kumar Mishra, Gouri Sankar Mishra, ... Tarun Maini in International Journal of Information Technology
    Article 12 July 2024
  12. L2XGNN: learning to explain graph neural networks

    Graph Neural Networks (GNNs) are a popular class of machine learning models. Inspired by the learning to explain (L2X) paradigm, we propose L2xGnn , a...

    Giuseppe Serra, Mathias Niepert in Machine Learning
    Article Open access 12 July 2024
  13. Decentralized traffic management of autonomous drones

    Coordination of local and global aerial traffic has become a legal and technological bottleneck as the number of unmanned vehicles in the common...

    Boldizsár Balázs, Tamás Vicsek, ... Gábor Vásárhelyi in Swarm Intelligence
    Article Open access 11 July 2024
  14. Explainable dating of greek papyri images

    Greek literary papyri, which are unique witnesses of antique literature, do not usually bear a date. They are thus currently dated based on...

    John Pavlopoulos, Maria Konstantinidou, ... Aristidis Likas in Machine Learning
    Article Open access 11 July 2024
  15. Virtual home staging and relighting from a single panorama under natural illumination

    Virtual staging technique can digitally showcase a variety of real-world scenes. However, relighting indoor scenes from a single image is challenging...

    Guanzhou Ji, Azadeh O. Sawyer, Srinivasa G. Narasimhan in Machine Vision and Applications
    Article Open access 11 July 2024
  16. Evaluation of data augmentation techniques on subjective tasks

    Data augmentation is widely applied in various computer vision problems for artificially increasing the size of a dataset by transforming the...

    Luis Gonzalez-Naharro, M. Julia Flores, ... Jose M. Puerta in Machine Vision and Applications
    Article 11 July 2024
  17. Cycling into the workshop: e-bike and m-bike mobility patterns for predictive maintenance in Barcelona’s bike-sharing system

    Bike-sharing systems have emerged as a significant element of urban mobility, providing an environmentally friendly transportation alternative. With...

    Jordi Grau-Escolano, Aleix Bassolas, Julian Vicens in EPJ Data Science
    Article Open access 11 July 2024
  18. Compressed sensing: a discrete optimization approach

    We study the Compressed Sensing (CS) problem, which is the problem of finding the most sparse vector that satisfies a set of linear measurements up...

    Dimitris Bertsimas, Nicholas A. G. Johnson in Machine Learning
    Article Open access 11 July 2024
  19. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency

    Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...

    Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen in Journal of Cryptology
    Article Open access 10 July 2024
  20. Examining ALS: reformed PCA and random forest for effective detection of ALS

    ALS (Amyotrophic Lateral Sclerosis) is a fatal neurodegenerative disease of the human motor system. It is a group of progressive diseases that...

    Abdullah Alqahtani, Shtwai Alsubai, ... Ashit Kumar Dutta in Journal of Big Data
    Article Open access 10 July 2024
Did you find what you were looking for? Share feedback.