


default search action
International Journal of Information Technology and Web Engineering, Volume 15
Volume 15, Number 1, 2020
- Carl Camilleri, Joseph G. Vella, Vitezslav Nezval:

ThespisTRX: Causally-Consistent Read Transactions. 1-16 - Anand Kumar Gupta

, Neetu Sardana:
A Novel Method to Dynamically Fix Threshold for Node Neighbourhood Based Link Prediction Techniques. 17-34 - Faiz Maazouzi

, Hafed Zarzour
, Yaser Jararweh:
An Effective Recommender System Based on Clustering Technique for TED Talks. 35-51 - Prabhishek Singh

, Raj Shree
:
Impact of Method Noise on SAR Image Despeckling. 52-63 - Nesreen Mohammad Alsharman, Inna V. Pivkina:

Generating Summaries Through Unigram and Bigram: Text Summarization. 64-74 - V. Sathiyamoorthi

:
An Intelligent System for Predicting a User Access to a Web Based E-Learning System Using Web Mining. 75-94
Volume 15, Number 2, 2020
- Antonio M. Rinaldi, Cristiano Russo

, Kurosh Madani:
A Semantic Matching Strategy for Very Large Knowledge Bases Integration. 1-29 - Fatma Ghorbel, Fayçal Hamdi

, Elisabeth Métais:
Dealing with Precise and Imprecise Temporal Data in Crisp Ontology. 30-49 - Mohammed Eldjilali Ouldkablia, Kechar Bouabdellah

, Samia Bouzefrane
:
IoT-Based Smart Home Process Management Using a Workflow Approach. 50-76 - Menaceur Sadek

, Makhlouf Derdour
, Abdelkrim Bouramoul
:
Using Query Expansion Techniques and Content-Based Filtering for Personalizing Analysis in Big Data. 77-101 - Iniobong Ekong, Oluwaseun Esan, Emeka Chukwu, Mohammed Kawu:

eHealth Adoption on Patients' Pre-Consultation Waiting Time: A Comparative Assessment of Two District Hospitals in Abuja, Nigeria. 102-113
Volume 15, Number 3, 2020
- Lalit Mohan Gupta, Abdus Samad, Hitendra Garg:

TBHM: A Secure Threshold-Based Encryption Combined With Homomorphic Properties for Communicating Health Records. 1-17 - Sukumar Rajendran, Prabhu Jayagopal:

Learning Models for Concept Extraction From Images With Drug Labels for a Unified Knowledge Base Utilizing NLP and IoT Tasks. 18-33 - Asma Saighi

, Zakaria Laboudi
, Philippe Roose, Sébastien Laborie
, Nassira Ghoualmi-Zine
:
On Using Multiple Disabilities Profiles to Adapt Multimedia Documents: A Novel Graph-Based Method. 34-60 - Lydia J. Gnanasigamani, Hari Seetha

:
Analysis of Crime Data Using Neighbourhood Rough Sets. 61-75 - Sathishkumar Natesan, Rajakumar Krishnan

:
FLCEER: Fuzzy Logic Cluster-Based Energy Efficient Routing Protocol for Underwater Acoustic Sensor Network. 76-101
Volume 15, Number 4, 2020
- Yongxiao Qiu

, Guanghui Du, Song Chai:
A Novel Algorithm for Distributed Data Stream Using Big Data Classification Model. 1-17 - Muthukumaran V., Devarasan Ezhilmaran

:
A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems. 18-36 - Pankaj Kumar Jadwal

, Sonal Jain
, Basant Agarwal:
Spectral Clustering and Cost-Sensitive Deep Neural Network-Based Undersampling Approach for P2P Lending Data. 37-52 - Lihua Zhu

:
Implementation of Web Log Mining Device Under Apriori Algorithm Improvement and Confidence Formula Optimization. 53-71 - Charanya R.

, R. A. K. Saravanaguru:
Integrity of E-Health Record Ensured With Context-Based Merkle Tree Through Temporal Shadow in Blockchain. 72-87

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














