International Journal of Intelligent Information Technologies
Papers
291
Papers 290
1 page of 29 pages (290 results)
Newest
Source
#1R. D. Brown-Gaston (UDC: University of the District of Columbia)
#2Anshu Saxena Arora (UDC: University of the District of Columbia)H-Index: 6
The United States Department of Defense (DoD) designs, constructs, and deploys social and autonomous robots and robotic weapons systems. Military robots are designed to follow the rules and conduct of the professions or roles they emulate, and it is expected that ethical principles are applied and aligned with such roles. The application of these principles appear paramount during the COVID-19 global pandemic, wherein substitute technologies are crucial in carrying out duties as humans are more ...
Source
Mobile number portability (MNP) across telecommunication networks entails the movement of a customer from one mobile service provider to another. This, often, is as a result of seeking better service delivery or personal choice. Churning prediction techniques seek to predict customers tending to churn and allow for improved customer sustenance campaigns and the cost therein through an improved service efficiency to customer. In this paper, MNP predicting model using integrated kernel logistic re...
Source
Source
#1Yassine El Adlouni (Sidi Mohamed Ben Abdellah University)
#2Noureddine En-Nahnahi (Sidi Mohamed Ben Abdellah University)
Last. Nabil Alami (Sidi Mohamed Ben Abdellah University)H-Index: 2
view all 6 authors...
Community question answering has become increasingly important as they are practical for seeking and sharing information. Applying deep learning models often leads to good performance, but it requires an extensive amount of annotated data, a problem exacerbated for languages suffering a scarcity of resources. Contextualized language representation models have gained success due to promising results obtained on a wide array of downstream natural language processing tasks such as text classificati...
Source
#1Manipriya Sankaranarayanan (National Institute of Technology, Tiruchirappalli)H-Index: 2
#2C. Mala (National Institute of Technology, Tiruchirappalli)H-Index: 6
Last. Samson Mathew (National Institute of Technology, Tiruchirappalli)H-Index: 5
view all 3 authors...
Source
#1Justice Kwame Appati (University of Ghana)H-Index: 4
#2Ismail Wafaa Denwar (University of Ghana)H-Index: 1
Last. Michael Agbo Tettey Soli (University of Ghana)H-Index: 1
view all 4 authors...
1 CitationsSource
Source
#1Rangarajan Parthasarathy (UIUC: University of Illinois at Urbana–Champaign)
#2David K. Wyant (Belmont University)H-Index: 7
Last. Anuradha Rangarajan (ISU: Indiana State University)
view all 5 authors...
The use of health apps on mobile devices by healthcare providers and receivers (patients) is proliferating This has elevated cybersecurity concerns owing to the transmittal of personal health information through the apps Research literature has mostly focused on the technology aspects of cybersecurity in mobile healthcare It is equally important to focus on the ethical and regulatory perspectives This article discusses cybersecurity concerns in mobile healthcare from the ethical perspective, the...
Source
Source
12345678910
Top fields of study
Machine learning
Data mining
World Wide Web
Information system
Information retrieval
Computer science
Knowledge management