Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

SOCIAL WEB (61 journals)

Showing 1 - 58 of 58 Journals sorted alphabetically
ACM Transactions on Social Computing     Hybrid Journal  
ACM Transactions on the Web (TWEB)     Hybrid Journal   (Followers: 3)
American Journal of Information Systems     Open Access   (Followers: 4)
Asiascape : Digital Asia     Hybrid Journal   (Followers: 1)
CCF Transactions on Networking     Hybrid Journal  
Communications in Mobile Computing     Open Access   (Followers: 14)
Computational Social Networks     Open Access   (Followers: 4)
Cyberpolitik Journal     Open Access  
Cyberpsychology, Behavior, and Social Networking     Hybrid Journal   (Followers: 16)
Data Science     Open Access   (Followers: 6)
Digital Library Perspectives     Hybrid Journal   (Followers: 42)
Discover Internet of Things     Open Access   (Followers: 2)
Informação & Informação     Open Access   (Followers: 2)
Information Technology and Libraries     Open Access   (Followers: 342)
Infrastructure Complexity     Open Access   (Followers: 5)
International Journal of Art, Culture and Design Technologies     Full-text available via subscription   (Followers: 10)
International Journal of Bullying Prevention     Hybrid Journal   (Followers: 1)
International Journal of Digital Humanities     Hybrid Journal   (Followers: 3)
International Journal of e-Collaboration     Full-text available via subscription  
International Journal of E-Entrepreneurship and Innovation     Full-text available via subscription   (Followers: 6)
International Journal of Entertainment Technology and Management     Hybrid Journal   (Followers: 1)
International Journal of Information Privacy, Security and Integrity     Hybrid Journal   (Followers: 25)
International Journal of Information Technology and Web Engineering     Hybrid Journal   (Followers: 2)
International Journal of Interactive Communication Systems and Technologies     Full-text available via subscription   (Followers: 2)
International Journal of Interactive Mobile Technologies     Open Access   (Followers: 8)
International Journal of Internet and Distributed Systems     Open Access   (Followers: 2)
International Journal of Knowledge Society Research     Full-text available via subscription  
International Journal of Networking and Virtual Organisations     Hybrid Journal   (Followers: 11)
International Journal of Social and Humanistic Computing     Hybrid Journal  
International Journal of Social Computing and Cyber-Physical Systems     Hybrid Journal  
International Journal of Social Media and Interactive Learning Environments     Hybrid Journal   (Followers: 14)
International Journal of Social Network Mining     Hybrid Journal   (Followers: 3)
International Journal of Virtual Communities and Social Networking     Full-text available via subscription   (Followers: 1)
International Journal of Web Based Communities     Hybrid Journal  
International Journal of Web-Based Learning and Teaching Technologies     Hybrid Journal   (Followers: 20)
International Journal on Semantic Web and Information Systems     Hybrid Journal   (Followers: 4)
Internet Technology Letters     Hybrid Journal  
JLIS.it     Open Access   (Followers: 7)
Journal of Cyber Policy     Hybrid Journal   (Followers: 1)
Journal of Digital & Social Media Marketing     Full-text available via subscription   (Followers: 18)
Journal of Social Structure     Open Access   (Followers: 1)
Medicine 2.0     Open Access   (Followers: 2)
Observatorio (OBS*)     Open Access  
Online Social Networks and Media     Hybrid Journal   (Followers: 9)
Policy & Internet     Hybrid Journal   (Followers: 11)
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies     Hybrid Journal  
Redes. Revista Hispana para el Análisis de Redes Sociales     Open Access  
RESET     Open Access  
Scientific Phone Apps and Mobile Devices     Open Access  
Social Media + Society     Open Access   (Followers: 25)
Social Network Analysis and Mining     Hybrid Journal   (Followers: 4)
Social Networking     Open Access   (Followers: 3)
Social Networks     Hybrid Journal   (Followers: 20)
Social Science Computer Review     Hybrid Journal   (Followers: 13)
Synthesis Lectures on the Semantic Web: Theory and Technology     Full-text available via subscription  
Teknokultura. Revista de Cultura Digital y Movimientos Sociales     Open Access  
Terminal     Open Access  
Texto Digital     Open Access  
Similar Journals
Journal Cover
International Journal of Information Technology and Web Engineering
Journal Prestige (SJR): 0.168
Citation Impact (citeScore): 1
Number of Followers: 2  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1554-1045 - ISSN (Online) 1554-1053
Published by IGI Global Homepage  [147 journals]
  • A Secure Data Transfer Approach with an Efficient Key Management over
           Cloud

    • Free pre-print version: Loading...

      Abstract: The growth in the number of cloud users who transfer their health data have enhanced the importance of cloud technology's services and capabilities. However, transferring patient health data to the cloud leaves researchers with several concerns and obstacles in privacy, storage, access, key-formation, and management. The proposed paper presents an efficient methodology for storing and accessing health information to and from the cloud. The symmetric key cryptography with the MD5 hash function is employed to enhance the framework’s efficiency. The proposed method also provides secure data sharing and removes the burden of an exhaustive re-encryption computation. In the paper, two different keys are computed: one key for each legitimate user among a group, and another key for the crypto-system, which is responsible to do all computations over the data. The method provides security against internal threats since only a single share of the key can be accessed. The efficiency of the model is measured by measuring the execution time for key formation, encryption, and decryption processes.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 0-0
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.306917
      Issue No: Vol. 17, No. 1 (2022)
       
  • Microclustering-based multi-class classification on imbalanced
           multi-relational datasets

    • Free pre-print version: Loading...

      Abstract: In a relational database, classification algorithms are used to look for patterns across several interconnected relations. Most of the methods for multi-relational classification algorithms implicitly assume that the classes in the target relation are equally represented. Thus, they tend to produce poor predictive performance over the imbalanced dataset. In this paper, we propose an algorithm level method MCMRC_IB for the classification of imbalanced multi-relational dataset. The proposed method extends MCMRC which is for balanced datasets. MCMRC_IB exploits the property of the imbalanced datasets that the minority class is represented by a smaller number of records usually 20-30% of the total records and is to be dealt accordingly by giving them weightages. The proposed method is able to handle multiple classes. Experimental results confirm the efficiency of the proposed method in terms of predictive accuracy, F-measure and G-mean.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 0-0
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.304053
      Issue No: Vol. 17, No. 1 (2022)
       
  • Autonomous Transaction Model for E-Commerce Management using
           the BlockChain Technology

    • Free pre-print version: Loading...

      Abstract: A Blockchain is an advanced technology that can power over a decentralized network. We bring it up to design the autonomous transaction system for E-commerce applications; because of the dramatic increase in IoT devices, communication between physical things is enabled. This brings more efficiency and accuracy, which benefits the outsiders while human interaction reduces. There is a big challenge in data storage after payment in the e-commerce application. Blockchain presents an appropriate platform for the distributed data storage; it also protects the data from outsiders. We create blocks that check and record each transaction that took place in the e-commerce application. Blockchain is going to prevent the user’s privacy from outsiders/banks that are being violated. We deliver this research in this paper in terms of the method with detailed design and full implementation. The system captures the user data, processes it and gives a visual representation of the processed data.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 0-0
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.304047
      Issue No: Vol. 17, No. 1 (2022)
       
  • Smart Contracts Security threats and Solutions

    • Free pre-print version: Loading...

      Abstract: Blockchain-enabled smart contracts are subjected to several issues leading to vigorous attacks such as the Decentralized Autonomous Organization (DAO) and the ParitySig bug on the Ethereum platform with disastrous consequences. Several solutions have been proposed. However, new threats are identified as technology evolves and new solutions are produced, while some older threats remain unsolved. Thus, the need to fill the gap with a more comprehensive survey on existing issues and solutions for researchers and practitioners arises. The resulting updated database will become an essential means for choosing a particular solution for a specific subject. In this review, we embrace mainly codifying security privacy and performance issues and their respective solutions. Each problem is attached to its corresponding solutions when they exist. A summary of the threats and solutions is provided as well as the relationship between threats’ importance and the given answers. We finally enumerate some directives for future works.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 0-0
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.304048
      Issue No: Vol. 17, No. 1 (2022)
       
  • Social Network User Profiling with Multilayer Semantic Modeling using Ego
           Network

    • Free pre-print version: Loading...

      Abstract: Social and information networks undermines the real relationship between the individuals (ego) and the friends (alters) they are connected on the social media and their impact on relationships. The structure of individual network is highlighted by the ego network. Egocentric approach is popular due to its focus on individual, group or communities. Size, structure and composition directly impact the ego networks. Moreover analysis includes strength of ego –alter ties degree and strength of ties. Degree gives the first overview of network. Social support in the network is explored with the ”gap” between the degree and average strength. These outcomes firmly propose that, regardless of whether the approaches to convey and to keep up social connections are evolving because of the dispersion of Online Social Networks, the way individuals sort out their social connections appears to stay unaltered. As online social networks evolves it helps in receiving more diverse information.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 0-0
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.304049
      Issue No: Vol. 17, No. 1 (2022)
       
  • Social Network Analysis for Precise Friend Suggestion for Twitter by
           Associating Multiple Networks using ML

    • Free pre-print version: Loading...

      Abstract: Our main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. The information gathered to make these predictions includes the user’s friends, tags, tweets, language spoken, id, etc. Based on these features, we trained our models using supervised learning methods. The machine learning-based approach used for this purpose is the K-Nearest neighbors approach. This approach is by and large used to decrease the dimensionality of the information alongside its feature space. K-nearest neighbor classifier is normally utilized in arrangement-based situations to recognize and distinguish between a few parameters. By using this, the features of the central user’s non-friends were compared. The friends and communities of a user are likely to be very different from any other user. Due to this, we select a single user and compare the results obtained for that user to suggest friends.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 0-0
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.304050
      Issue No: Vol. 17, No. 1 (2022)
       
  • Malware Threat Affecting Financial Organization Analysis Using Machine
           Learning Approach

    • Free pre-print version: Loading...

      Authors: Rawat; Romil, Rimal, Yagya Nath, William, P., Dahima, Snehil, Gupta, Sonali, Sankaran, K. Sakthidasan
      Pages: 1 - 20
      Abstract: Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies in the finance industry and their clients. Its key aim is to steal victims' online money-lending records and vital credentials as they go to their banks' websites. Without analyzing network packet payload computing (PPC), IP address labels, port number traces, or protocol knowledge, we have used Machine Learning (ML) modeling to detect Emotet malware infections and recognize Emotet related congestion flows in this work. To classify emotet associated flows and detect emotet infections, the output outcome values are compared by four separate popular ML algorithms: RF (Random Forest), MLP (Multi-Layer Perceptron), SMO (Sequential Minimal Optimization Technique), and the LRM (Logistic Regression Model). The suggested classifier is then improved by determining the right hyperparameter and attribute set range. Using network packet (computation) identifiers, the Random Forest classifier detects emotet-based flows with 99.9726 percent precision and a 92.3 percent true positive rating.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-20
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.304051
      Issue No: Vol. 17, No. 1 (2022)
       
  • Research on System Risks of “Internet + Supply Chain Finance” Based on
           SNA, Dynamic Evolutionary Game, and Bayesian Learning Principle Simulation
           

    • Free pre-print version: Loading...

      Authors: Liu; Ji Lu, Hu, Ni, Zhang, Cheng
      Pages: 1 - 16
      Abstract: Under the background of "Internet +", the supply chain financial model and process have undergone profound changes. Firstly, through the social network analysis, the correlation between the participants in the Internet + supply chain finance is directly visualized. Secondly, the dynamic risk evolution model of the system is constructed based on the different functions between the participants. Unstable solution and saddle points of the system be calculated ; on this basis, Bayesian learning principles are used to build an Internet + supply chain financial credit default risk simulation model, and the simulation model is encapsulated. Finally, a numerical example is used to verify the simulation model operation Convenience, efficiency and reliability.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-16
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.308465
      Issue No: Vol. 17, No. 1 (2022)
       
  • Time Effective Cloud Resource Scheduling Method for Data-Intensive Smart
           Systems

    • Free pre-print version: Loading...

      Authors: Duan; Jiguang, Li, Yan, Duan, Liying, Sharma, Amit
      Pages: 1 - 15
      Abstract: The cloud computing platforms are being deployed nowadays for resource scheduling of real time data intensive applications. Cloud computing still deals with the challenge of time oriented effective scheduling for resource allocation, while striving to provide the efficient quality of service. This article proposes a time prioritization-based ensemble resource management and Ant Colony based optimization (ERM-ACO) algorithm in order to aid effective resource allocation and scheduling mechanism which specifically deals with the task group feasibility, assessing and selecting the computing and the storage resources required to perform specific tasks. The research outcomes are obtained in terms of time-effective demand fulfillment rate, average response time as well as resource utilization time considering various grouping mechanisms based on data arrival intensity consideration. The proposed framework when compared to the present state-of-the-art methods, optimal fitness percentage of 98% is observed signifying the feasible outcomes for real-time scenarios.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-15
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.306915
      Issue No: Vol. 17, No. 1 (2022)
       
  • An Integrated Remote Control-Based Human-Robot Interface for Education
           Application

    • Free pre-print version: Loading...

      Authors: Duan; Xue-xi, Wang, Yun-ling, Dou, Wei-shan, Kumar, Rajeev, Saluja, Nitin
      Pages: 1 - 18
      Abstract: Portable interfaced robot arms equipped with mobile user interactions are significantly being utilized in modern world. The application of teaching robotics is being used in challenging pandemic situation but it is still challenging due to mathematical formulation. This article utilizes the augmented reality (AR) concept for remote control-based human-robot interaction using the Bluetooth correspondence. The proposed framework incorporates different modules like a robot arm control, a regulator module and a distant portable smartphone application for envisioning the robot arm points for its real-time relevance. This novel approach fuses AR innovation into portable application which permit the continuous virtual coordination with actual physical platform. The simulation yields effective outcomes with 96.94% accuracy for testing stage while maintaining error and loss values of 0.194 and 0.183 respectively. The proposed interface gives consistent results for teaching application in real time changing environment by outperforming existing methods with an accuracy improvement of 13.4
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-18
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.306916
      Issue No: Vol. 17, No. 1 (2022)
       
  • Predicting Academic Performance of Immigrant Students Using XGBoost
           Regressor

    • Free pre-print version: Loading...

      Authors: Jeganathan; Selvaprabu, Lakshminarayanan, Arun Raj, Ramachandran, Nandhakumar, Tunze, Godwin Brown
      Pages: 1 - 19
      Abstract: The education sector has been effectively dealing with the prediction of academic performance of the Immigrant students since the research associated with this domain proves beneficial enough for those countries where the ministry of education has to cater to such immigrants for altering and updating policies in order to elevate the overall education pedagogy for them. The present research begins with analyzing varied educational data mining and machine learning techniques that helps in assessing the data fetched form PISA. It’s elucidated that XGBoost stands out to be the ideal most machine learning technique for achieving the desired results. Subsequently, the parameters have been optimized using the hyper parameter tuning techniques and implemented on the XGBoost Regressor algorithm. Resultant there is low error rate and higher level of predictive ability using the machine learning algorithms which assures better predictions using the PISA data. The final results have been discussed along with the upcoming future research work.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-19
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.304052
      Issue No: Vol. 17, No. 1 (2022)
       
  • Intelligent Anti-Jamming Decision Algorithm of Bivariate Frequency Hopping
           Pattern Based on DQN With PER and Pareto

    • Free pre-print version: Loading...

      Authors: Zhu; Jiasheng, Zhao, Zhijin, Zheng, Shilian
      Pages: 1 - 23
      Abstract: To improve the anti-jamming performance of frequency hopping system in complex electromagnetic environment, a Deep Q-Network algorithm with priority experience replay (PER) based on Pareto samples (PPER-DQN) is proposed, which makes intelligent decision for bivariate FH pattern. The system model, state-action space and reward function are designed based on the main parameters of the FH pattern. The DQN is used to improve the flexibility of the FH pattern. Based on the definition of Pareto dominance, the PER based on the TD-error and immediate reward is proposed. To ensure the diversity of the training set, it is formed by Pareto sample set and several random samples. When selecting Pareto sample, the confidence coefficient is introduced to modify its priority. It guarantees the learning value of the training set and improves the learning efficiency of DQN. The simulation results show that the efficiency, convergence speed and stability of the algorithm are effectively improved. And the generated bivariate FH pattern has better performance than the conventional FH pattern.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-23
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.297970
      Issue No: Vol. 17, No. 1 (2022)
       
  • Binary Self-Adaptive Salp Swarm Optimization-Based Dynamic Load Balancing
           in Cloud Computing

    • Free pre-print version: Loading...

      Authors: Parida; Bivasa Ranjan, Rath, Amiya Kumar, Mohapatra, Hitesh
      Pages: 1 - 25
      Abstract: In the recent era of cloud computing, the huge demand for virtual resource provisioning requires mitigating the challenges of uniform load distribution as well as efficient resource utilization among the virtual machines in cloud datacenters. Salp swarm optimization is one of the simplest, yet efficient metaheuristic techniques to balance the load among the VMs. The proposed methodology has incorporated self-adaptive procedures to deal with the unpredictable population of the tasks being executed in cloud datacenters. Moreover, a sigmoid transfer function has been integrated to solve the discrete problem of tasks assigned to the appropriate VMs. Thus, the proposed algorithm binary self-adaptive salp swarm optimization has been simulated and compared with some of the recent metaheuristic approaches, like BSO, MPSO, and SSO for conflicting scheduling quality of service parameters. It has been observed from the result analysis that the proposed algorithm outperforms in terms of makespan, response time, and degree of load imbalance while maximizing the resource utilization.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-25
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.295964
      Issue No: Vol. 17, No. 1 (2022)
       
  • On Cost-Aware Heterogeneous Cloudlet Deployment for Mobile Edge Computing

    • Free pre-print version: Loading...

      Authors: Ye; Hengzhou, Huang, Fengyi, Hao, Wei
      Pages: 1 - 23
      Abstract: Edge computing undertakes downlink cloud services and uplink terminal computing tasks, data interaction latency and network transmission cost are thus significantly reduced. Although a lot of research has been conducted in mobile edge computing (MEC), which assumed that all homogeneous cloudlets are placed in WMAN and user mobility is also ignored, little attention is paid to how to place heterogeneous cloudlets in wireless metropolitan area network (WMAN) to minimize the deployment cost of cloudlets. Meanwhile, the method of selecting an optimal access point (AP) for deployment, modeling and heuristic algorithm (HA) needs to be improved. Therefore, this paper design a new heterogeneous cloudlet deployment model considering the quality of service (QoS) and mobility of users, and the Improved Heuristic Algorithm (IHA) is proposed to minimize cloudlet deployment cost. The extensive simulations demonstrate that IHA is more efficient than HA and the designed model is superior to the existing work.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-23
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.297968
      Issue No: Vol. 17, No. 1 (2022)
       
  • Multi-Objective Optimization-Oriented Resource Allocation in the Fog
           Environment

    • Free pre-print version: Loading...

      Authors: Harika; Sonti, Krishna, B. Chaitanya
      Pages: 1 - 25
      Abstract: Fog computing is a decentralized computer system where data, processing, storage, as well as applications are located anywhere between the cloud and data source. Fog computing takes the cloud closer to users, decreasing the latency and allows the deployment of new delay-sensitive appliances. An important feature of a fog-cloud network is the process of decision-making on assigning the resources to execute the tasks of application. This paper aims to propose a resource allocation strategy for fog computing that determines the effective process under the consideration of the objectives that includes the constraints like credibility score, concurrency, price affordability and task time computation. Moreover, the credibility score is determined based on the execution efficiency, Service response rate, access reliability and Reboot rate. Thereby, the optimal allocation of resources is handled by a new Hybrid Monarch-Dragon Algorithm (HM-DA) that hybrids the concept of Dragonfly Algorithm (DA) and Monarch Butterfly Optimization (MBO) algorithm.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-25
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.297969
      Issue No: Vol. 17, No. 1 (2022)
       
  • SCNTA

    • Free pre-print version: Loading...

      Authors: Rawat; Romil, Garg, Bhagwati, Pachlasiya, Kiran, Mahor, Vinod, Telang, Shrikant, Chouhan, Mukesh, Shukla, Surendra Kumar, Mishra, Rina
      Pages: 1 - 19
      Abstract: Real-time network inspection applications face a threat of vulnerability as high-speed networks continue to expand. For companies and ISPs, real-time traffic classification is an issue. The classifier monitor is made up of three modules: Capturing_of_Packets (CoP) and pre-processing, Reconciliation_of_Flow (RoF), and categorization of Machine Learning (ML). Based on parallel processing along with well-defined interfacing of data, the modules are framed, allowing each module to be modified and upgraded separately. The Reconciliation_of_Flow (RoF) mechanism becomes the output bottleneck in this pipeline. In this implementation, an optimal reconciliation process was used, resulting in an average delivery time of 0.62 seconds. In order to verify our method, we equated the results of the AdaBoost Ensemble Learning Algorithm (ABELA), Naive Bayes (NB), Decision Tree (DT), K-Nearest Neighbor (KNN), and Flexible Naive Bayes (FNB) in the classification module. The architectural design of the run time CSNTA categorization (flow-based) scheme is presented in this paper.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-19
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.297971
      Issue No: Vol. 17, No. 1 (2022)
       
  • Biometric Cloud Services for Web-Based Examinations

    • Free pre-print version: Loading...

      Authors: Rukhiran; Meennapa, Pukdesree, Sorapak, Netinant, Paniti
      Pages: 1 - 25
      Abstract: Biometric recognition may be used in conjunction with human authentication on a smartphone to improve accuracy, reliability, and simplicity, and to aid in fraud prevention and user authentication. While single biometric authentication addresses environmental degradation and sensor noise limitations, and the single point of failure scenario in biometric systems can result in more robust biometric systems, multimodal biometric authentication can improve the accuracy of identification and recognition. The purpose of this research is to propose a facial and speech authentication system that is cloud-based and supports a web-based examination approach. The system enables students' biometrics to be registered, students to be recognized, and student recognition results to be reported. The confusion matrix is used to compare the results of positive and negative detection in various ways, including accuracy score, precision value, and recall value. Adaptive multimodal biometric authentication should be designed and evaluated for further research using the optimal weights for each biometric.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-25
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.299022
      Issue No: Vol. 17, No. 1 (2022)
       
  • Relationship Between Personality Patterns and Harmfulness

    • Free pre-print version: Loading...

      Authors: Matsumoto; Kazuyuki, Kishima, Ryota, Tsuchiya, Seiji, Hirobayashi, Tomoki, Yoshida, Minoru, Kita, Kenji
      Pages: 1 - 24
      Abstract: This paper hypothesize that harmful utterances need to be judged in context of whole sentences, and extract features of harmful expressions using a general-purpose language model. Based on the extracted features, we propose a method to predict the presence or absence of harmful categories. In addition, the authors believe that it is possible to analyze users who incite others by combining this method with research on analyzing the personality of the speaker from statements on social networking sites. The results confirmed that the proposed method can judge the possibility of harmful comments with higher accuracy than simple dictionary-based models or models using a distributed representations of words. The relationship between personality patterns and harmful expressions was also confirmed by an analysis based on a harmful judgment model.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-24
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.298654
      Issue No: Vol. 17, No. 1 (2022)
       
  • Winning the War on Terror

    • Free pre-print version: Loading...

      Authors: Wang; Yaojie, Cui, Xiaolong, He, Peiyong
      Pages: 1 - 15
      Abstract: From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a quantitative analysis method of active risk assessment method with terrorists as the research object is proposed. This assessment method introduces deep learning algorithms into social computing problems on the basis of information coding technology. We design a special "Top-k" algorithm to screen the terrorism related features, and optimize the evaluation model through convolution neural network, so as to determine the risk level of terrorist suspects. This study provides important research ideas for counter-terrorism assessment, and verifies the feasibility and accuracy of the proposed scheme through a number of experiments, which greatly improves the efficiency of counter-terrorism early warning.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-15
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.288038
      Issue No: Vol. 17, No. 1 (2022)
       
  • Extracting Entity Synonymous Relations via Context-Aware Permutation
           Invariance

    • Free pre-print version: Loading...

      Authors: Yan; Nan, Huang, Subin, Kong, Chao
      Pages: 1 - 17
      Abstract: Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level statistics, ignoring the context semantics between entities. For example, the contexts around ''apple'' determine whether ''apple'' is a kind of fruit or Apple Inc. In this paper, an entity synonymous relation extraction approach is proposed using context-aware permutation invariance. Specifically, a triplet network is used to obtain the permutation invariance between the entities to learn whether two given entities possess synonymous relation. To track more synonymous features, the relational context semantics and entity representations are integrated into the triplet network, which can improve the performance of extracting entity synonymous relations. The proposed approach is implemented on three real-world datasets. Experimental results demonstrate that the approach performs better than the other compared approaches on entity synonymous relation extraction task.
      Keywords: Web Technologies; Computer Science & IT; Web Technologies & Engineering
      Citation: International Journal of Information Technology and Web Engineering (IJITWE), Volume: 17, Issue: 1 (2022) Pages: 1-17
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJITWE.288039
      Issue No: Vol. 17, No. 1 (2022)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.235.140.84
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-