International Journal of Information Technology最新文献

筛选
英文 中文
A novel three-phase hybrid cryptographic algorithm for data security 用于数据安全的新型三相混合加密算法
International Journal of Information Technology Pub Date : 2024-08-09 DOI: 10.1007/s41870-024-02117-0
Pooja, Shalu, Shyla, Yogita Sangwan, Basu Dev Shivahare
{"title":"A novel three-phase hybrid cryptographic algorithm for data security","authors":"Pooja, Shalu, Shyla, Yogita Sangwan, Basu Dev Shivahare","doi":"10.1007/s41870-024-02117-0","DOIUrl":"https://doi.org/10.1007/s41870-024-02117-0","url":null,"abstract":"","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"9 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141921702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring emotion detection in Kashmiri audio reviews using the fusion model of CNN, LSTM, and RNN: gender-specific speech patterns and performance analysis 利用 CNN、LSTM 和 RNN 的融合模型探索克什米尔语音频评论中的情感检测:特定性别语音模式和性能分析
International Journal of Information Technology Pub Date : 2024-08-08 DOI: 10.1007/s41870-024-02105-4
Gh. Mohmad Dar, R. Delhibabu
{"title":"Exploring emotion detection in Kashmiri audio reviews using the fusion model of CNN, LSTM, and RNN: gender-specific speech patterns and performance analysis","authors":"Gh. Mohmad Dar, R. Delhibabu","doi":"10.1007/s41870-024-02105-4","DOIUrl":"https://doi.org/10.1007/s41870-024-02105-4","url":null,"abstract":"","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"59 37","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141929052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient static minkowski clustering for web service aggregation 用于网络服务聚合的高效静态明考斯基聚类
International Journal of Information Technology Pub Date : 2024-08-07 DOI: 10.1007/s41870-024-02048-w
Suad kamil Ayfan, Dhiah Al-Shammary, Ahmed M. Mahdi, Ayman Ibaida, Khandakar Ahmed
{"title":"Efficient static minkowski clustering for web service aggregation","authors":"Suad kamil Ayfan, Dhiah Al-Shammary, Ahmed M. Mahdi, Ayman Ibaida, Khandakar Ahmed","doi":"10.1007/s41870-024-02048-w","DOIUrl":"https://doi.org/10.1007/s41870-024-02048-w","url":null,"abstract":"<p>The paper presents new design and implementation for Web messages static clustering based on TF-IDF and Minkowski Distance metric. The target of the proposed Minkowski clustering is to empower Web messages aggregators in order to reduce network traffic by aggregating highly similar messages. Web services (W.S.) technology offers an extensive platform for representing, discovering, and calling services in many environments, including Service Oriented Architectures (SOA). The basis of W.S. technology is built upon several XML-based protocols, such as the Simple Object Access Protocol (SOAP), which effectively guarantees W.S. flexibility, transparency, and harmony. There is an increasing demand to enhance the efficiency of online services. It is mainly limited by the over utilization of XML. SOAP communications lead to high network congestion. Furthermore, they cause higher latency and processing delays when compared to alternative technologies. Previous studies have proposed XML clustering techniques to support compression- aggregation models. Technically, aggregation can decrease the overall size the SOAP messages, hence decreasing the needed bandwidth across clients and servers.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"97 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differently processed modality and appropriate model selection lead to richer representation of the multimodal input 不同的处理模式和适当的模型选择可带来更丰富的多模式输入表征
International Journal of Information Technology Pub Date : 2024-08-07 DOI: 10.1007/s41870-024-02113-4
Saroj Kumar Panda, Tausif Diwan, Omprakash G. Kakde
{"title":"Differently processed modality and appropriate model selection lead to richer representation of the multimodal input","authors":"Saroj Kumar Panda, Tausif Diwan, Omprakash G. Kakde","doi":"10.1007/s41870-024-02113-4","DOIUrl":"https://doi.org/10.1007/s41870-024-02113-4","url":null,"abstract":"<p>We aim to effectively solve and improvise the Meta Meme Challenge for the binary classification of hateful memes detection on a multimodal dataset launched by Meta. This problem has its challenges in terms of individual modality processing and its impact on the final classification of hateful memes. We focus on feature-level fusion methodologies in proposing the solutions for hateful memes detection in comparison with the decision-level fusion as feature-level fusion generates richer features’ representation for further processing. Appropriate model selection in multimodal data processing plays an important role in the downstream tasks. Moreover, inherent negativity associated with the visual modality may not be detected completely through the visual processing models, necessitating the differently processed visual data through some other techniques. Specifically, we propose two feature-level fusion-based methodologies for the aforesaid classification problem, employing VisualBERT for the effective representation of textual and visual modality. Additionally, we employ image captioning generating the textual captions from the visual modality of the multimodal input which is further fused with the actual text associated with the input through the Tensor Fusion Networks. Our proposed model considerably outperforms the state of the arts on accuracy and AuROC performance metrics.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel and secured bitcoin method for identification of counterfeit goods in logistics supply management within online shopping 在网上购物物流供应管理中识别假冒商品的新型安全比特币方法
International Journal of Information Technology Pub Date : 2024-08-06 DOI: 10.1007/s41870-024-02021-7
Ashutosh Singh, K. K. Ramachandran, Somanchi Hari Krishna, Chhaya Nayak, K. Anusha, Purnendu Bikash Acharjee, Satyajee Srivastava
{"title":"A novel and secured bitcoin method for identification of counterfeit goods in logistics supply management within online shopping","authors":"Ashutosh Singh, K. K. Ramachandran, Somanchi Hari Krishna, Chhaya Nayak, K. Anusha, Purnendu Bikash Acharjee, Satyajee Srivastava","doi":"10.1007/s41870-024-02021-7","DOIUrl":"https://doi.org/10.1007/s41870-024-02021-7","url":null,"abstract":"<p>Counterfeit merchandise poses significant challenges for both consumers and retailers. When counterfeit goods infiltrate the market, they damage the trustworthiness and reputation of legitimate companies, leading to negative publicity. Furthermore, these imitations can be harmful, especially in critical sectors like food and pharmaceuticals. To address this issue, it is essential to identify and prevent counterfeit products from reaching consumers. Our proposed solution leverages blockchain technology to authenticate products. Blockchain’s decentralized database securely stores all transaction data, ensuring transparency and traceability. Additionally, we introduce a tool that records ownership and product details. By utilizing a Quick Response (QR) code, consumers can easily verify the authenticity of a product, thus accessing its manufacturing and ownership information. This approach not only safeguards consumer safety but also protects the reputation and financial performance of legitimate business.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"86 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative approaches to multi-attribute decision-making in brain carcinoma diagnosis: a complex q-rung orthopair trapezoidal fuzzy framework and aggregation operator analysis 脑癌诊断中多属性决策的创新方法:复杂q-rung正对梯形模糊框架和聚合算子分析
International Journal of Information Technology Pub Date : 2024-08-06 DOI: 10.1007/s41870-024-02072-w
Pairote Yiarayong
{"title":"Innovative approaches to multi-attribute decision-making in brain carcinoma diagnosis: a complex q-rung orthopair trapezoidal fuzzy framework and aggregation operator analysis","authors":"Pairote Yiarayong","doi":"10.1007/s41870-024-02072-w","DOIUrl":"https://doi.org/10.1007/s41870-024-02072-w","url":null,"abstract":"<p>This manuscript tackles brain carcinoma diagnosis through a multi-attribute decision-making lens. Using complex <i>q</i>-rung orthopair trapezoidal fuzzy sets, we develop tailored aggregation operators and explore their significance. We delve into idempotency theory, highlighting instances where monotonicity and boundedness fail. Building on these operators, we propose a novel methodology for fuzzy environment decision-making. Applied to medical diagnosis, we identify the most dangerous brain carcinoma type, showcasing practical utility. Comparative analyses confirm the superiority of our technique, promising advancements in diagnosis methodologies.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain adaptation of transformer-based neural network model for clinical note classification in Indian healthcare 基于变压器的神经网络模型的领域适应性,用于印度医疗保健领域的临床病历分类
International Journal of Information Technology Pub Date : 2024-08-06 DOI: 10.1007/s41870-024-02053-z
Swati Saigaonkar, Vaibhav Narawade
{"title":"Domain adaptation of transformer-based neural network model for clinical note classification in Indian healthcare","authors":"Swati Saigaonkar, Vaibhav Narawade","doi":"10.1007/s41870-024-02053-z","DOIUrl":"https://doi.org/10.1007/s41870-024-02053-z","url":null,"abstract":"<p>The exploration of clinical notes has garnered attention, primarily owing to the wealth of unstructured information they encompass. Although substantial research has been carried out, notable gaps persist. One such gap pertains to the absence of work on real-time Indian data. The work commenced by initially using Medical Information Mart for Intensive Care (MIMIC III) dataset, concentrating on diseases such as Asthma, Myocardial Infarction (MI), and Chronic Kidney Diseases (CKD), for training the model. A novel model, transformer-based, was built which incorporated knowledge of abbreviations, symptoms, and domain knowledge of the diseases, named as SM-DBERT + + . Subsequently, the model was applied to an Indian dataset using transfer learning, where domain knowledge extracted from Indian sources was utilized to adapt to domain differences. Further, an ensemble of pre-trained models was built, applying transfer learning principles. Through this comprehensive methodology, we aimed to bridge the gap pertaining to the application of deep learning techniques to Indian healthcare datasets. The results obtained were better than fine-tuned Bidirectional Encoder Representations from Transformers (BERT), Distilled BERT (DISTILBERT) and A Lite BERT (ALBERT) models and also other specialized models like Scientific BERT (SCI-BERT), Clinical Biomedical BERT (Clinical Bio-BERT), and Biomedical BERT (BIOBERT) with an accuracy of 0.93 when full notes were used and an accuracy of 0.89 when extracted sections were used. It has demonstrated that model trained on one dataset yields good results on another similar dataset as this model incorporates domain knowledge which could be modified during transfer learning to adapt to the new domain.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing sarcasm detection through grasshopper optimization with deep learning based sentiment analysis on social media 基于深度学习的社交媒体情感分析,通过蚱蜢优化加强讽刺检测
International Journal of Information Technology Pub Date : 2024-08-05 DOI: 10.1007/s41870-024-02057-9
Nidamanuri Srinu, K. Sivaraman, M. Sriram
{"title":"Enhancing sarcasm detection through grasshopper optimization with deep learning based sentiment analysis on social media","authors":"Nidamanuri Srinu, K. Sivaraman, M. Sriram","doi":"10.1007/s41870-024-02057-9","DOIUrl":"https://doi.org/10.1007/s41870-024-02057-9","url":null,"abstract":"<p>Detecting sarcasm in social media presents challenges in natural language processing (NLP) due to the informal language, contextual complexities, and nuanced expression of sentiment. Integrating sentiment analysis (SA) with sarcasm detection enhances the understanding of text meaning. Deep learning (DL), utilizing neural networks to grasp lexical and contextual features, offers a method for sarcasm detection. However, current DL-based sarcasm detection methods often overlook sentiment semantics, a crucial aspect for improving detection outcomes. Therefore, this study develops a new sarcasm detection using grasshopper optimization algorithm with DL (SD-GOADL) technique. The SD-GOADL technique aims to explore the patterns that exist in social media data and detect sarcasm. To obtain this, the SD-GOADL technique undergoes data pre-processing and Glove based word embedding technique. Next, the classification of sarcasm takes place using deep belief network (DBN) system. For enhancing the detection results of the DBN approach, the SD-GOADL technique uses GOA for hyperparameter selection process. The stimulation outcome of the SD-GOADL technique is tested on a sarcasm dataset and the results highlight the significant performance of the SD-GOADL technique compared to recent models.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAFARM: simulated annealing based framework for association rule mining SAFARM:基于模拟退火的关联规则挖掘框架
International Journal of Information Technology Pub Date : 2024-08-05 DOI: 10.1007/s41870-024-02079-3
Preeti Kaur, Sujal Goel, Aryan Tyagi, Sharil Malik, Utkarsh Shrivastava
{"title":"SAFARM: simulated annealing based framework for association rule mining","authors":"Preeti Kaur, Sujal Goel, Aryan Tyagi, Sharil Malik, Utkarsh Shrivastava","doi":"10.1007/s41870-024-02079-3","DOIUrl":"https://doi.org/10.1007/s41870-024-02079-3","url":null,"abstract":"<p>The research paper introduces an algorithm called SAFARM which performs association rule mining with the help of simulated annealing. It’s a multi-objective problem with vast search space. The suggested approach is independent of the database as it does not require minimum support or minimum confidence specification. In the algorithm, a fitness function is designed to fulfill the required objective and the presentation of rules is proposed with a compact structure. The correctness and efficiency of the algorithm is verified by testing it on synthetic and real databases.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"2012 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm 通过动态虚拟控制器部署和攻击级检测算法增强 SDN 抵御 DDoS 攻击的能力
International Journal of Information Technology Pub Date : 2024-08-02 DOI: 10.1007/s41870-024-02064-w
Florance G., R J Anandhi
{"title":"Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm","authors":"Florance G., R J Anandhi","doi":"10.1007/s41870-024-02064-w","DOIUrl":"https://doi.org/10.1007/s41870-024-02064-w","url":null,"abstract":"<p>The rapid evolution of network traffic created various problems in detecting Distributed Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) provides some individuality in that the SDN Controller uses a technique to examine the acquired data from the Flow Table (FT). As traffic increases, the controller's processing capability decreases, resulting in insufficient space availability for the FT and flow buffer. Understanding the struggles that exist in the controller and FT, this study provided a distinctive procedure that will increase performance, reduce controller load, manage FT space, and flow buffers that are activated by the Virtual Controller (VC). It dynamically completes the bundle of packets received at the router/switch, analyze the FT using the Attack Level Detection (ALD) method, assesses the bandwidth utilization of a particular user, and maps to the ingress port. The ALD algorithm detects mismatched packets and congested packets originating from faked IP and network addresses. This effort is related with the regular scenario and the attack level scenario, which use a mininet simulator with two controllers, the POX controller and the Open Daylight controller, to simulate major performance variations. This study efficiently lowers the overload of the VC and FT, hence preventing the DDoS assault employing VC.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信