We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Delineation of ECG waveform components using encoder-decoder architecture with Postprocess algorithm

    With the exponential increase in heart disease cases, it is essential to construct models (algorithms) that can be used to delineate...

    Deepti Sharma, Narendra Kohli in International Journal of Information Technology
    Article 02 July 2024
  2. Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics

    Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...

    Yevhenii Shudrenko, Andreas Timm-Giel in Computing
    Article Open access 02 July 2024
  3. Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies

    Deploying virtual machines poses a significant challenge for cloud data centers, requiring careful consideration of various objectives such as...

    Arezoo Ghasemi, Abolfazl Toroghi Haghighat, Amin Keshavarzi in Computing
    Article 02 July 2024
  4. Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to...

    Jiangang Hou, **n Li, ... Changzhen Hu in Computing
    Article 02 July 2024
  5. Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm

    In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...

    Voore Subba Rao, G. Ravindra Babu in International Journal of Information Technology
    Article 02 July 2024
  6. A novel approach to detect, analyze and block adversarial web pages

    The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with...

    M. Ranjith Kumar, Darshana A. Naik, ... C. V. Guru Rao in International Journal of Information Technology
    Article 02 July 2024
  7. Detecting review fraud using metaheuristic graph neural networks

    Although online reviews play a critical role in sha** consumer behavior and establishing institutional trust, this reliance on online reviews has...

    Article Open access 02 July 2024
  8. Analysis of channel capacity for UWB antenna for improvements in the data rates and low Power transmission over wireless application

    Multiple input- Multiple output- Ultra-wideband (MIMO-UWB) is a wireless communication approach that combines multiple antennas at the transmitter...

    Nitin I. Bhopale, Sunil N. Pawar in International Journal of Information Technology
    Article 02 July 2024
  9. Heuristic approaches for non-exhaustive pattern-based change detection in dynamic networks

    Dynamic networks are ubiquitous in many domains for modelling evolving graph-structured data and detecting changes allows us to understand the...

    Corrado Loglisci, Angelo Impedovo, ... Michelangelo Ceci in Journal of Intelligent Information Systems
    Article Open access 02 July 2024
  10. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

    Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...

    Rachana Y. Patil, Arijit Karati, Yogesh H. Patil in International Journal of Information Technology
    Article 02 July 2024
  11. New custom rating for improving recommendation system performance

    Recommendation system is currently attracting the interest of many explorers. Various new businesses have surfaced with the rise of online marketing...

    Tora Fahrudin, Dedy Rahman Wijaya in Journal of Big Data
    Article Open access 02 July 2024
  12. Creating a representative archive of performance practice at the National Theatre of Great Britain

    In my experience as an in-house archivist for the National Theatre (NT) of Great Britain, I have discovered that what the NT Archive staff have...

    Erin Lee in Archival Science
    Article 01 July 2024
  13. An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network

    Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...

    Rasmita Jena, Ram Chandra Barik, ... Saroj Pradhan in International Journal of Information Technology
    Article 01 July 2024
  14. Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis

    Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...

    Article 01 July 2024
  15. Advancing personal identity verification by integrating facial recognition through deep learning algorithms

    This research delves into the realm of facial recognition technology, leveraging the power of convolutional neural network (CNN) to enhance personal...

    Article 01 July 2024
  16. Editorial

    Andreas Henrich, Wolfgang Müller, ... Uta Störl in Datenbank-Spektrum
    Article Open access 01 July 2024
  17. The digital transformation of jurisprudence: an evaluation of ChatGPT-4’s applicability to solve cases in business law

    In the evolving landscape of legal information systems, ChatGPT-4 and other advanced conversational agents (CAs) offer the potential to disruptively...

    Sascha Schweitzer, Markus Conrads in Artificial Intelligence and Law
    Article Open access 01 July 2024
  18. Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles

    The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has...

    Selcuk Aslan in Computing
    Article Open access 01 July 2024
  19. A novel IMW-mrmr feature selection approach for early detection of hypertension with HRV analysis

    In the absence of control measures, hypertension poses a major threat to the world’s population’s health and can quickly develop into vascular...

    A. R. Sohara Banu, V. Nagaveni in International Journal of Information Technology
    Article 01 July 2024
  20. An optimal feature subset selection technique to improve accounting information security for intrusion detection systems

    The goal of an intrusion detection system (IDS) is to secure data on the network by monitoring the flow of traffic and identifying malicious users....

    Ameer Saheb Shaker, Atheer Alkhafaji, ... Ahmed Jassim Al-Yasiri in International Journal of Information Technology
    Article 01 July 2024
Did you find what you were looking for? Share feedback.