We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network

    Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...

    Rasmita Jena, Ram Chandra Barik, ... Saroj Pradhan in International Journal of Information Technology
    Article 01 July 2024
  2. Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis

    Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...

    Article 01 July 2024
  3. Advancing personal identity verification by integrating facial recognition through deep learning algorithms

    This research delves into the realm of facial recognition technology, leveraging the power of convolutional neural network (CNN) to enhance personal...

    Article 01 July 2024
  4. An optimal feature subset selection technique to improve accounting information security for intrusion detection systems

    The goal of an intrusion detection system (IDS) is to secure data on the network by monitoring the flow of traffic and identifying malicious users....

    Ameer Saheb Shaker, Atheer Alkhafaji, ... Ahmed Jassim Al-Yasiri in International Journal of Information Technology
    Article 01 July 2024
  5. Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles

    The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has...

    Selcuk Aslan in Computing
    Article Open access 01 July 2024
  6. A novel IMW-mrmr feature selection approach for early detection of hypertension with HRV analysis

    In the absence of control measures, hypertension poses a major threat to the world’s population’s health and can quickly develop into vascular...

    A. R. Sohara Banu, V. Nagaveni in International Journal of Information Technology
    Article 01 July 2024
  7. An empirical cryptocurrency price forecasting model

    The goal of this manuscript is to use deep learning based multi-modal hybrid model to forecast the value of bitcoins by analyzing the influence of...

    Abdalabbas Hassan Kadhim, Dawood Salman Al Farttoosi, ... Akeel Hamza Almagtome in International Journal of Information Technology
    Article 01 July 2024
  8. Automated generation of smart contract code from legal contract specifications with Symboleo2SC

    Smart contracts (SCs) are software systems that monitor and partially control the execution of legal contracts to ensure compliance with the...

    Aidin Rasti, Amal Ahmed Anda, ... John Mylopoulos in Software and Systems Modeling
    Article 29 June 2024
  9. Analyzing psychological information using lattice hydrodynamic model coupled with electronic throttle control

    Electronic throttle control (ETC), a mechanism for precise regulation of engine power and torque production, is a typical component in modern...

    Meenakshi Mehra, Vikash Siwach, ... Poonam Redhu in International Journal of Information Technology
    Article 28 June 2024
  10. Cognitive Intelligent Decisions for Big Data and Cloud Computing in Industrial Applications using Trifold Algorithms

    In contemporary real-time applications, diminutive devices are increasingly employing a greater portion of the spectrum to transmit data despite the...

    Shitharth Selvarajan, Hariprasath Manoharan, ... Wattana Viriyasitavat in Cognitive Computation
    Article 28 June 2024
  11. Secure SSI framework using the optimized Orkey identity schema

    In the era of digital transformation and increasing concerns regarding data privacy, the concept of Self-Sovereign Identity (SSI) has attained...

    K. Pandu N., A. Sasi Kumar in International Journal of Information Technology
    Article 28 June 2024
  12. Human factors in model-driven engineering: future research goals and initiatives for MDE

    Software modelling and model-driven engineering (MDE) is traditionally studied from a technical perspective. However, one of the core motivations...

    Grischa Liebel, Jil Klünder, ... Vasco Amaral in Software and Systems Modeling
    Article 28 June 2024
  13. A novel and optimized IoT –ML based plant classification, monitoring and prediction system

    With the increasing demand for modern technologies and automation, there is a need to maintain plants by adopting such modern automated technologies....

    Sukhdeep Kaur, Harishchander Anandaram, ... Gopal Krishna in International Journal of Information Technology
    Article 28 June 2024
  14. Sustainable augmented framework using smart sensors with ATM inspired 5G technologies for enterprise networks

    The primary driving force behind the development of fifth-generation (5G) applications is the necessity of Concurrent Multipath Transfer (CMT)....

    Shivakumar Kagi, Anita Venugopal, ... Abhishek MB in International Journal of Information Technology
    Article 27 June 2024
  15. Grey wolf optimization-based fractional MPPT for enhancing performance and efficiency of photovoltaic systems

    The photovoltaic (PV) cell is used to transform solar energy into electrical energy which is utilized by us. However, the amount of received solar...

    Hayder Salah Mohammed, Mahmood H. Enad, Ali Akbar Khaleel in International Journal of Information Technology
    Article 27 June 2024
  16. Learning from Failure: Towards Develo** a Disease Diagnosis Assistant That Also Learns from Unsuccessful Diagnoses

    In recent years, automatic disease diagnosis has gained immense popularity in research and industry communities. Humans learn a task through both...

    Abhisek Tiwari, Swarna S, ... Sarbajeet Tiwari in Cognitive Computation
    Article 27 June 2024
  17. Assessing radiographic findings on finger X-rays using an enhanced deep learning approach

    The human upper extremity, which includes the shoulder, humerus, elbow, forearm, wrist, hand, and fingers, demonstrates incredible biological...

    Rahul Kumar, Suganya Devi K., Devi Prasad Mohapatra in International Journal of Information Technology
    Article 27 June 2024
  18. THC-DFECC-based privacy preserved smart contract creation for cloud data security

    Currently, cloud services have become a novel business model for information services owing to the rapid development of Cloud Computing (CC)...

    Chandra Sekhar Tiwari, Vijay Kumar Jha in International Journal of Information Technology
    Article 27 June 2024
  19. AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor

    In recent years, the significance of millimeter wave sensors has achieved a paramount role, especially in the non-invasive and ubiquitous analysis of...

    Fahim Niaz, Jian Zhang, ... Naveed Imran in Computing
    Article 27 June 2024
Did you find what you were looking for? Share feedback.