Journal of Information and Telecommunication最新文献

筛选
英文 中文
A voting ensemble classifier for stress detection 用于压力检测的投票集合分类器
IF 2.7
Journal of Information and Telecommunication Pub Date : 2024-01-30 DOI: 10.1080/24751839.2024.2306786
Sami Hadhri, Mondher Hadiji, Walid Labidi
{"title":"A voting ensemble classifier for stress detection","authors":"Sami Hadhri, Mondher Hadiji, Walid Labidi","doi":"10.1080/24751839.2024.2306786","DOIUrl":"https://doi.org/10.1080/24751839.2024.2306786","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140485358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iTEVAC: an enhanced trusted evacuation system leveraging fog computing and IoT iTEVAC:利用雾计算和物联网的增强型可信疏散系统
IF 2.7
Journal of Information and Telecommunication Pub Date : 2024-01-23 DOI: 10.1080/24751839.2024.2306787
T. V. Le, Huan Thien Tran, Samia Bouzefrane
{"title":"iTEVAC: an enhanced trusted evacuation system leveraging fog computing and IoT","authors":"T. V. Le, Huan Thien Tran, Samia Bouzefrane","doi":"10.1080/24751839.2024.2306787","DOIUrl":"https://doi.org/10.1080/24751839.2024.2306787","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139603107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability-guaranteed odd-order variable-bandwidth filters using stabilized odd-order transfer function 使用稳定奇阶传递函数的稳定奇阶变带宽滤波器
IF 2.7
Journal of Information and Telecommunication Pub Date : 2024-01-21 DOI: 10.1080/24751839.2024.2303880
Tian-Bo Deng
{"title":"Stability-guaranteed odd-order variable-bandwidth filters using stabilized odd-order transfer function","authors":"Tian-Bo Deng","doi":"10.1080/24751839.2024.2303880","DOIUrl":"https://doi.org/10.1080/24751839.2024.2303880","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139523655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing deep learning in chipless RFID tag detection: an investigation on high-precision mm-wave spatial tag estimation from 2D virtual imaging 在无芯片 RFID 标签检测中利用深度学习:对二维虚拟成像中高精度毫米波空间标签估计的研究
IF 2.7
Journal of Information and Telecommunication Pub Date : 2024-01-03 DOI: 10.1080/24751839.2023.2300223
Tahmid Hasan Pranto, Mohammad Nabiluzzaman Neloy, Abdulla All Noman, Sheikh Wasif, Md. Abdul Wahab, R. Rahman
{"title":"Utilizing deep learning in chipless RFID tag detection: an investigation on high-precision mm-wave spatial tag estimation from 2D virtual imaging","authors":"Tahmid Hasan Pranto, Mohammad Nabiluzzaman Neloy, Abdulla All Noman, Sheikh Wasif, Md. Abdul Wahab, R. Rahman","doi":"10.1080/24751839.2023.2300223","DOIUrl":"https://doi.org/10.1080/24751839.2023.2300223","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139451070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the performance of outage probability in cognitive NOMA random networks with hardware impairments 论有硬件损伤的认知 NOMA 随机网络中的中断概率性能
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-12-20 DOI: 10.1080/24751839.2023.2294570
Pham Thi Dan Ngoc, Tran Trung Duy, Nguyen Luong Nhat, Tan Hanh, Yeon Ho Chung, L. Tu
{"title":"On the performance of outage probability in cognitive NOMA random networks with hardware impairments","authors":"Pham Thi Dan Ngoc, Tran Trung Duy, Nguyen Luong Nhat, Tan Hanh, Yeon Ho Chung, L. Tu","doi":"10.1080/24751839.2023.2294570","DOIUrl":"https://doi.org/10.1080/24751839.2023.2294570","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relay-assisted communication over a fluctuating two-ray fading channel 波动双射线衰减信道上的中继辅助通信
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-12-19 DOI: 10.1080/24751839.2023.2295094
H. Mehdi, Zakir Hussain, S. M. A. Saleem, Syed Areeb Ahmed
{"title":"Relay-assisted communication over a fluctuating two-ray fading channel","authors":"H. Mehdi, Zakir Hussain, S. M. A. Saleem, Syed Areeb Ahmed","doi":"10.1080/24751839.2023.2295094","DOIUrl":"https://doi.org/10.1080/24751839.2023.2295094","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138962758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of data envelopment analysis to IT project evaluation, with special emphasis on the choice of inputs and outputs in the context of the organization in question 在信息技术项目评估中应用数据包络分析法,特别强调在有关组织的背景下选择投入和产出
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-11-26 DOI: 10.1080/24751839.2023.2286764
B. Gładysz, D. Despotis, D. Kuchta
{"title":"Application of data envelopment analysis to IT project evaluation, with special emphasis on the choice of inputs and outputs in the context of the organization in question","authors":"B. Gładysz, D. Despotis, D. Kuchta","doi":"10.1080/24751839.2023.2286764","DOIUrl":"https://doi.org/10.1080/24751839.2023.2286764","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption 用于图像加密的修正凯撒密码和洗牌重排算法
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-11-26 DOI: 10.1080/24751839.2023.2285549
Dhairya Veera, Ramchandra S. Mangrulkar, Chetashri Bhadane, Kiran Bhowmick, P. Chavan
{"title":"Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption","authors":"Dhairya Veera, Ramchandra S. Mangrulkar, Chetashri Bhadane, Kiran Bhowmick, P. Chavan","doi":"10.1080/24751839.2023.2285549","DOIUrl":"https://doi.org/10.1080/24751839.2023.2285549","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coverage probability of energy harvesting enabled LoRa networks with stochastic geometry 具有随机几何形状的能量采集 LoRa 网络的覆盖概率
IF 2.7
Journal of Information and Telecommunication Pub Date : 2023-11-19 DOI: 10.1080/24751839.2023.2281144
Thi-Tuyet-Hai Nguyen, Tan N. Nguyen, Tran Trung Duy, Nguyen Hong Son, Tan Hanh, Minh Bui Vu, L. Tu
{"title":"Coverage probability of energy harvesting enabled LoRa networks with stochastic geometry","authors":"Thi-Tuyet-Hai Nguyen, Tan N. Nguyen, Tran Trung Duy, Nguyen Hong Son, Tan Hanh, Minh Bui Vu, L. Tu","doi":"10.1080/24751839.2023.2281144","DOIUrl":"https://doi.org/10.1080/24751839.2023.2281144","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139260425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight authentication scheme based on Elliptic Curve El Gamal 基于椭圆曲线El - Gamal的轻量级认证方案
Journal of Information and Telecommunication Pub Date : 2023-11-14 DOI: 10.1080/24751839.2023.2281143
Sondes Baccouri, Hassene Farhat, Tarek Azzabi, Rabah Attia
{"title":"Lightweight authentication scheme based on Elliptic Curve El Gamal","authors":"Sondes Baccouri, Hassene Farhat, Tarek Azzabi, Rabah Attia","doi":"10.1080/24751839.2023.2281143","DOIUrl":"https://doi.org/10.1080/24751839.2023.2281143","url":null,"abstract":"Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents the ideal choice for implementing public-key cryptography in resource-limited devices, such as those found in envisioned Internet of Things applications, e.g. wireless sensors. Elliptic Curve ElGamal (ECEG) is a renowned member of the ECC family. However, it requires encoding the message before encryption and decoding it after decryption. To better improve the processing time and to avoid sharing a lookup table, we propose, in this document, a new method that exchanges encoding parameters and authenticates endpoints at the same time. So, our new protocol ensures the authentication of communication parties and integrity of ephemeral encoding parameters. The robustness of our solution is proven by the Scyther tool. Experimental tests have been carried out, and the performance of the new methods is provided and compared with RSA and related work. Security and performance analysis show that our new scheme has achieved improved functionality and higher security while maintaining low computational.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134991859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信