We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Analysis of channel capacity for UWB antenna for improvements in the data rates and low Power transmission over wireless application

    Multiple input- Multiple output- Ultra-wideband (MIMO-UWB) is a wireless communication approach that combines multiple antennas at the transmitter...

    Nitin I. Bhopale, Sunil N. Pawar in International Journal of Information Technology
    Article 02 July 2024
  2. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

    Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...

    Rachana Y. Patil, Arijit Karati, Yogesh H. Patil in International Journal of Information Technology
    Article 02 July 2024
  3. A nonlinear optimal control approach for 3-DOF four-cable driven parallel robots

    In this article, a nonlinear optimal control approach is proposed for the dynamic model of 3-DOF four-cable driven parallel robots (CDPR). To solve...

    G. Rigatos, M. Abbaszadeh, J. Pomares in Autonomous Intelligent Systems
    Article Open access 01 July 2024
  4. An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network

    Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...

    Rasmita Jena, Ram Chandra Barik, ... Saroj Pradhan in International Journal of Information Technology
    Article 01 July 2024
  5. Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis

    Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...

    Article 01 July 2024
  6. Advancing personal identity verification by integrating facial recognition through deep learning algorithms

    This research delves into the realm of facial recognition technology, leveraging the power of convolutional neural network (CNN) to enhance personal...

    Article 01 July 2024
  7. An optimal feature subset selection technique to improve accounting information security for intrusion detection systems

    The goal of an intrusion detection system (IDS) is to secure data on the network by monitoring the flow of traffic and identifying malicious users....

    Ameer Saheb Shaker, Atheer Alkhafaji, ... Ahmed Jassim Al-Yasiri in International Journal of Information Technology
    Article 01 July 2024
  8. A novel IMW-mrmr feature selection approach for early detection of hypertension with HRV analysis

    In the absence of control measures, hypertension poses a major threat to the world’s population’s health and can quickly develop into vascular...

    A. R. Sohara Banu, V. Nagaveni in International Journal of Information Technology
    Article 01 July 2024
  9. An empirical cryptocurrency price forecasting model

    The goal of this manuscript is to use deep learning based multi-modal hybrid model to forecast the value of bitcoins by analyzing the influence of...

    Abdalabbas Hassan Kadhim, Dawood Salman Al Farttoosi, ... Akeel Hamza Almagtome in International Journal of Information Technology
    Article 01 July 2024
  10. Analyzing psychological information using lattice hydrodynamic model coupled with electronic throttle control

    Electronic throttle control (ETC), a mechanism for precise regulation of engine power and torque production, is a typical component in modern...

    Meenakshi Mehra, Vikash Siwach, ... Poonam Redhu in International Journal of Information Technology
    Article 28 June 2024
  11. Secure SSI framework using the optimized Orkey identity schema

    In the era of digital transformation and increasing concerns regarding data privacy, the concept of Self-Sovereign Identity (SSI) has attained...

    K. Pandu N., A. Sasi Kumar in International Journal of Information Technology
    Article 28 June 2024
  12. A novel and optimized IoT –ML based plant classification, monitoring and prediction system

    With the increasing demand for modern technologies and automation, there is a need to maintain plants by adopting such modern automated technologies....

    Sukhdeep Kaur, Harishchander Anandaram, ... Gopal Krishna in International Journal of Information Technology
    Article 28 June 2024
  13. Sustainable augmented framework using smart sensors with ATM inspired 5G technologies for enterprise networks

    The primary driving force behind the development of fifth-generation (5G) applications is the necessity of Concurrent Multipath Transfer (CMT)....

    Shivakumar Kagi, Anita Venugopal, ... Abhishek MB in International Journal of Information Technology
    Article 27 June 2024
  14. Grey wolf optimization-based fractional MPPT for enhancing performance and efficiency of photovoltaic systems

    The photovoltaic (PV) cell is used to transform solar energy into electrical energy which is utilized by us. However, the amount of received solar...

    Hayder Salah Mohammed, Mahmood H. Enad, Ali Akbar Khaleel in International Journal of Information Technology
    Article 27 June 2024
  15. Sample complexity of variance-reduced policy gradient: weaker assumptions and lower bounds

    Gabor Paczolay, Matteo Papini, ... Marcello Restelli in Machine Learning
    Article 27 June 2024
  16. Evidential uncertainty sampling strategies for active learning

    Recent studies in active learning, particularly in uncertainty sampling, have focused on the decomposition of model uncertainty into reducible and...

    Arthur Hoarau, Vincent Lemaire, ... Arnaud Martin in Machine Learning
    Article 27 June 2024
  17. Verifying a Sequent Calculus Prover for First-Order Logic with Functions in Isabelle/HOL

    We describe the design, implementation and verification of an automated theorem prover for first-order logic with functions. The proof search...

    Asta Halkjær From, Frederik Krogsdal Jacobsen in Journal of Automated Reasoning
    Article Open access 27 June 2024
  18. THC-DFECC-based privacy preserved smart contract creation for cloud data security

    Currently, cloud services have become a novel business model for information services owing to the rapid development of Cloud Computing (CC)...

    Chandra Sekhar Tiwari, Vijay Kumar Jha in International Journal of Information Technology
    Article 27 June 2024
  19. Assessing radiographic findings on finger X-rays using an enhanced deep learning approach

    The human upper extremity, which includes the shoulder, humerus, elbow, forearm, wrist, hand, and fingers, demonstrates incredible biological...

    Rahul Kumar, Suganya Devi K., Devi Prasad Mohapatra in International Journal of Information Technology
    Article 27 June 2024
  20. Secure and fast asynchronous Vertical Federated Learning via cascaded hybrid optimization

    Vertical Federated Learning (VFL) is gaining increasing attention due to its ability to enable multiple parties to collaboratively train a...

    Ganyu Wang, Qingsong Zhang, ... Charles X. Ling in Machine Learning
    Article 27 June 2024
Did you find what you were looking for? Share feedback.