We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Lattice-based device-to-device authentication and key exchange protocol for IoT system

    Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices...

    Article 05 July 2024
  2. A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm

    Today, with the increasing expansion of IoT devices and the growing number of user requests, processing their demands in computational environments...

    Sayed Mohsen Hashemi, Amir Sahafi, ... Mahdi Bohlouli in Computing
    Article 04 July 2024
  3. Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation

    Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...

    Baptiste Gueuziec, Jean-Pierre Gallois, Frédéric Boulanger in Innovations in Systems and Software Engineering
    Article 04 July 2024
  4. Nature inspired recommendation with path optimization for online social network communities

    Human sentiment prevalent in online dialogues largely governs the formation of communities in online social networks. These recommendation methods...

    Mansi Goel, Adwitiya Sinha in International Journal of Information Technology
    Article 04 July 2024
  5. SymboleoPC: checking properties of legal contracts

    Legal contracts specify requirements for business transactions. Symboleo was recently proposed as a formal specification language for legal...

    Alireza Parvizimosaed, Marco Roveri, ... John Mylopoulos in Software and Systems Modeling
    Article 03 July 2024
  6. Guest editorial to the special section on PoEM’2022

    This guest editorial presents the papers contributing to the 15th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2022)....

    Balbir S. Barn, Kurt Sandkuhl, ... Tony Clark in Software and Systems Modeling
    Article 03 July 2024
  7. Transfer learning for emotion detection in conversational text: a hybrid deep learning approach with pre-trained embeddings

    Understanding the emotions and sentiments from conversations has relevance in many application areas. Specifically, conversational agents,...

    Sheetal Kusal, Shruti Patil, ... Deepali Vora in International Journal of Information Technology
    Article 03 July 2024
  8. Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure

    In edge computing, repetitive computations are a common occurrence. However, the traditional TCP/IP architecture used in edge computing fails to...

    Atiyeh Javaheri, Ali Bohlooli, Kamal Jamshidi in Computing
    Article 03 July 2024
  9. Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain

    The adoption of Smart Contracts has revolutionized industries like DeFi and supply chain management, streamlining processes and enhancing...

    Samia El Haddouti, Mohammed Khaldoune, ... Mohamed Dafir Ech-Cherif El Kettani in Computing
    Article 03 July 2024
  10. Delineation of ECG waveform components using encoder-decoder architecture with Postprocess algorithm

    With the exponential increase in heart disease cases, it is essential to construct models (algorithms) that can be used to delineate...

    Deepti Sharma, Narendra Kohli in International Journal of Information Technology
    Article 02 July 2024
  11. Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies

    Deploying virtual machines poses a significant challenge for cloud data centers, requiring careful consideration of various objectives such as...

    Arezoo Ghasemi, Abolfazl Toroghi Haghighat, Amin Keshavarzi in Computing
    Article 02 July 2024
  12. Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics

    Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...

    Yevhenii Shudrenko, Andreas Timm-Giel in Computing
    Article Open access 02 July 2024
  13. Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm

    In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...

    Voore Subba Rao, G. Ravindra Babu in International Journal of Information Technology
    Article 02 July 2024
  14. Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to...

    Jiangang Hou, **n Li, ... Changzhen Hu in Computing
    Article 02 July 2024
  15. A novel approach to detect, analyze and block adversarial web pages

    The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with...

    M. Ranjith Kumar, Darshana A. Naik, ... C. V. Guru Rao in International Journal of Information Technology
    Article 02 July 2024
  16. Detecting review fraud using metaheuristic graph neural networks

    Although online reviews play a critical role in sha** consumer behavior and establishing institutional trust, this reliance on online reviews has...

    Article Open access 02 July 2024
  17. Analysis of channel capacity for UWB antenna for improvements in the data rates and low Power transmission over wireless application

    Multiple input- Multiple output- Ultra-wideband (MIMO-UWB) is a wireless communication approach that combines multiple antennas at the transmitter...

    Nitin I. Bhopale, Sunil N. Pawar in International Journal of Information Technology
    Article 02 July 2024
  18. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

    Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...

    Rachana Y. Patil, Arijit Karati, Yogesh H. Patil in International Journal of Information Technology
    Article 02 July 2024
  19. Unmasking GAN-Generated Faces with Optimal Deep Learning and Cognitive Computing-Based Cutting-Edge Detection System

    The emergence of deep learning (DL) has improved the excellence of generated media. However, with the enlarged level of photorealism, synthetic media...

    Rana Alabdan, Jamal Alsamri, ... Mesfer Al Duhayyim in Cognitive Computation
    Article 02 July 2024
  20. A survey of multi-population optimization algorithms for tracking the moving optimum in dynamic environments

    The solution spaces of many real-world optimization problems change over time. Such problems are called dynamic optimization problems (DOPs), which...

    Delaram Yazdani, Danial Yazdani, ... Trung Thanh Nguyen in Journal of Membrane Computing
    Article Open access 02 July 2024
Did you find what you were looking for? Share feedback.