Journal of Information and Telecommunication最新文献

筛选
英文 中文
Utilizing deep learning in chipless RFID tag detection: an investigation on high-precision mm-wave spatial tag estimation from 2D virtual imaging 在无芯片 RFID 标签检测中利用深度学习:对二维虚拟成像中高精度毫米波空间标签估计的研究
IF 2.7
Journal of Information and Telecommunication Pub Date : 2024-01-03 DOI: 10.1080/24751839.2023.2300223
Tahmid Hasan Pranto, Mohammad Nabiluzzaman Neloy, Abdulla All Noman, Sheikh Wasif, Md. Abdul Wahab, R. Rahman
{"title":"Utilizing deep learning in chipless RFID tag detection: an investigation on high-precision mm-wave spatial tag estimation from 2D virtual imaging","authors":"Tahmid Hasan Pranto, Mohammad Nabiluzzaman Neloy, Abdulla All Noman, Sheikh Wasif, Md. Abdul Wahab, R. Rahman","doi":"10.1080/24751839.2023.2300223","DOIUrl":"https://doi.org/10.1080/24751839.2023.2300223","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"11 11","pages":""},"PeriodicalIF":2.7,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139451070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the performance of outage probability in cognitive NOMA random networks with hardware impairments 论有硬件损伤的认知 NOMA 随机网络中的中断概率性能
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-12-20 DOI: 10.1080/24751839.2023.2294570
Pham Thi Dan Ngoc, Tran Trung Duy, Nguyen Luong Nhat, Tan Hanh, Yeon Ho Chung, L. Tu
{"title":"On the performance of outage probability in cognitive NOMA random networks with hardware impairments","authors":"Pham Thi Dan Ngoc, Tran Trung Duy, Nguyen Luong Nhat, Tan Hanh, Yeon Ho Chung, L. Tu","doi":"10.1080/24751839.2023.2294570","DOIUrl":"https://doi.org/10.1080/24751839.2023.2294570","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"200 ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relay-assisted communication over a fluctuating two-ray fading channel 波动双射线衰减信道上的中继辅助通信
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-12-19 DOI: 10.1080/24751839.2023.2295094
H. Mehdi, Zakir Hussain, S. M. A. Saleem, Syed Areeb Ahmed
{"title":"Relay-assisted communication over a fluctuating two-ray fading channel","authors":"H. Mehdi, Zakir Hussain, S. M. A. Saleem, Syed Areeb Ahmed","doi":"10.1080/24751839.2023.2295094","DOIUrl":"https://doi.org/10.1080/24751839.2023.2295094","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":" 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138962758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption 用于图像加密的修正凯撒密码和洗牌重排算法
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-11-26 DOI: 10.1080/24751839.2023.2285549
Dhairya Veera, Ramchandra S. Mangrulkar, Chetashri Bhadane, Kiran Bhowmick, P. Chavan
{"title":"Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption","authors":"Dhairya Veera, Ramchandra S. Mangrulkar, Chetashri Bhadane, Kiran Bhowmick, P. Chavan","doi":"10.1080/24751839.2023.2285549","DOIUrl":"https://doi.org/10.1080/24751839.2023.2285549","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"176 12 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of data envelopment analysis to IT project evaluation, with special emphasis on the choice of inputs and outputs in the context of the organization in question 在信息技术项目评估中应用数据包络分析法,特别强调在有关组织的背景下选择投入和产出
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-11-26 DOI: 10.1080/24751839.2023.2286764
B. Gładysz, D. Despotis, D. Kuchta
{"title":"Application of data envelopment analysis to IT project evaluation, with special emphasis on the choice of inputs and outputs in the context of the organization in question","authors":"B. Gładysz, D. Despotis, D. Kuchta","doi":"10.1080/24751839.2023.2286764","DOIUrl":"https://doi.org/10.1080/24751839.2023.2286764","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"13 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coverage probability of energy harvesting enabled LoRa networks with stochastic geometry 具有随机几何形状的能量采集 LoRa 网络的覆盖概率
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-11-19 DOI: 10.1080/24751839.2023.2281144
Thi-Tuyet-Hai Nguyen, Tan N. Nguyen, Tran Trung Duy, Nguyen Hong Son, Tan Hanh, Minh Bui Vu, L. Tu
{"title":"Coverage probability of energy harvesting enabled LoRa networks with stochastic geometry","authors":"Thi-Tuyet-Hai Nguyen, Tan N. Nguyen, Tran Trung Duy, Nguyen Hong Son, Tan Hanh, Minh Bui Vu, L. Tu","doi":"10.1080/24751839.2023.2281144","DOIUrl":"https://doi.org/10.1080/24751839.2023.2281144","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"38 5","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139260425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight authentication scheme based on Elliptic Curve El Gamal 基于椭圆曲线El - Gamal的轻量级认证方案
Journal of Information and Telecommunication Pub Date : 2023-11-14 DOI: 10.1080/24751839.2023.2281143
Sondes Baccouri, Hassene Farhat, Tarek Azzabi, Rabah Attia
{"title":"Lightweight authentication scheme based on Elliptic Curve El Gamal","authors":"Sondes Baccouri, Hassene Farhat, Tarek Azzabi, Rabah Attia","doi":"10.1080/24751839.2023.2281143","DOIUrl":"https://doi.org/10.1080/24751839.2023.2281143","url":null,"abstract":"Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents the ideal choice for implementing public-key cryptography in resource-limited devices, such as those found in envisioned Internet of Things applications, e.g. wireless sensors. Elliptic Curve ElGamal (ECEG) is a renowned member of the ECC family. However, it requires encoding the message before encryption and decoding it after decryption. To better improve the processing time and to avoid sharing a lookup table, we propose, in this document, a new method that exchanges encoding parameters and authenticates endpoints at the same time. So, our new protocol ensures the authentication of communication parties and integrity of ephemeral encoding parameters. The robustness of our solution is proven by the Scyther tool. Experimental tests have been carried out, and the performance of the new methods is provided and compared with RSA and related work. Security and performance analysis show that our new scheme has achieved improved functionality and higher security while maintaining low computational.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134991859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature selection in intrusion detection systems: a new hybrid fusion of Bat algorithm and Residue Number System 入侵检测系统中的特征选择:一种新的Bat算法与剩余数系统的混合融合
Journal of Information and Telecommunication Pub Date : 2023-11-06 DOI: 10.1080/24751839.2023.2272484
Yakub Kayode Saheed, Temitope Olubanjo Kehinde, Mustafa Ayobami Raji, Usman Ahmad Baba
{"title":"Feature selection in intrusion detection systems: a new hybrid fusion of Bat algorithm and Residue Number System","authors":"Yakub Kayode Saheed, Temitope Olubanjo Kehinde, Mustafa Ayobami Raji, Usman Ahmad Baba","doi":"10.1080/24751839.2023.2272484","DOIUrl":"https://doi.org/10.1080/24751839.2023.2272484","url":null,"abstract":"This research introduces innovative approaches to enhance intrusion detection systems (IDSs) by addressing critical challenges in existing methods. Various machine-learning techniques, including nature-inspired metaheuristics, Bayesian algorithms, and swarm intelligence, have been proposed in the past for attribute selection and IDS performance improvement. However, these methods have often fallen short in terms of detection accuracy, detection rate, precision, and F-score. To tackle these issues, the paper presents a novel hybrid feature selection approach combining the Bat metaheuristic algorithm with the Residue Number System (RNS). Initially, the Bat algorithm is utilized to partition training data and eliminate irrelevant attributes. Recognizing the Bat algorithm's slower training and testing times, RNS is incorporated to enhance processing speed. Additionally, principal component analysis (PCA) is employed for feature extraction. In a second phase, RNS is excluded for feature selection, allowing the Bat algorithm to perform this task while PCA handles feature extraction. Subsequently, classification is conducted using naive bayes, and k-Nearest Neighbors. Experimental results demonstrate the remarkable effectiveness of combining RNS with the Bat algorithm, achieving outstanding detection rates, accuracy, and F-scores. Notably, the fusion approach doubles processing speed. The findings are further validated through benchmarking against existing intrusion detection methods, establishing their competitiveness.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"15 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135589918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employing synthetic data for addressing the class imbalance in aspect-based sentiment classification 利用合成数据解决基于方面的情感分类中的类不平衡问题
Journal of Information and Telecommunication Pub Date : 2023-10-30 DOI: 10.1080/24751839.2023.2270824
Vaishali Ganganwar, Ratnavel Rajalakshmi
{"title":"Employing synthetic data for addressing the class imbalance in aspect-based sentiment classification","authors":"Vaishali Ganganwar, Ratnavel Rajalakshmi","doi":"10.1080/24751839.2023.2270824","DOIUrl":"https://doi.org/10.1080/24751839.2023.2270824","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136103474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient near-field localization aided with reconfigurable intelligent surface using geometric dilution of precision 利用几何精度稀释辅助可重构智能曲面的高效近场定位
Journal of Information and Telecommunication Pub Date : 2023-10-26 DOI: 10.1080/24751839.2023.2272488
Abdulrahaman Kh. Alhafid, Sedki Younis, Y. E. Mohammed Ali
{"title":"Efficient near-field localization aided with reconfigurable intelligent surface using geometric dilution of precision","authors":"Abdulrahaman Kh. Alhafid, Sedki Younis, Y. E. Mohammed Ali","doi":"10.1080/24751839.2023.2272488","DOIUrl":"https://doi.org/10.1080/24751839.2023.2272488","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"160 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134908796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信