Institutt for informasjonsteknologi og kommunikasjon: Recent submissions
Now showing items 41-60 of 136
-
Investigating the implementation of telehealth and digital technologies during public health crisis: A qualitative review
(Peer reviewed; Journal article, 2023)Public health crises such as the Coronavirus disease 2019 (COVID-19) pandemic across the world overstrained the health care system. Accordingly, telehealth and digital technologies were implemented. Telehealth and digital ... -
Data driven approaches for smart city planning and design: a case scenario on urban data management
(Peer reviewed; Journal article, 2023)Purpose Because of the use of digital technologies in smart cities, municipalities are increasingly facing issues related to urban data management and are seeking ways to exploit these huge amounts of data for the ... -
Examining the adoption of telehealth during public health emergencies based on technology organization environment framework
(Peer reviewed; Journal article, 2023)Purpose Disasters and pandemics pose challenges to health-care provision. Accordingly, the need for adopting innovative approach is required in providing care to patient. Therefore, the purpose of this study is to present ... -
Decentralized brokered enabled ecosystem for data marketplace in smart cities towards a data sharing economy
(Peer reviewed; Journal article, 2023)Presently data are indispensably important as cities consider data as a commodity which can be traded to earn revenues. In urban environment, data generated from internet of things devices, smart meters, smart sensors, ... -
LSTM-DGWO-Based Sentiment Analysis Framework for Analyzing Online Customer Reviews
(Peer reviewed; Journal article, 2023)Sentiment analysis furnishes consumer concerns regarding products, enabling product enhancement development. Existing sentiment analysis using machine learning techniques is computationally intensive and less reliable. ... -
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)
(Peer reviewed; Journal article, 2022)The recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ... -
Against the Conflation of Corporate Strategy, Ethics, and the Politics of AI
(Journal article, 2023)Ethics as we know it is ill equipped to resist abuse by technology companies, Van Maanen argues in a recent article. Ethics is too malleable, provides too many different theories, and allows for a plethora of ethical ... -
Blockchain for requirements traceability: A qualitative approach
(Peer reviewed; Journal article, 2022)Blockchain technology has emerged as a “disruptive innovation” that has received significant attention in academic and organizational settings. However, most of the existing research is focused on technical issues of ... -
Class-Level Refactoring Prediction by Ensemble Learning with Various Feature Selection Techniques
(Peer reviewed; Journal article, 2022)Background: Refactoring is changing a software system without affecting the software functionality. The current researchers aim i to identify the appropriate method(s) or class(s) that needs to be refactored in object-oriented ... -
Investigating factors for using insurance apps by customers: a study of a developing country
(Peer reviewed; Journal article, 2022)With the fast development of insurtech, many researchers are doing research in understanding customer behavior regarding the adoption of insurance applications. However, there is a lack of research on the subject in ... -
Particle swarm optimization of the spectral and energy efficiency of an SCMA-based heterogeneous cellular network
(Peer reviewed; Journal article, 2022)Background The effect of stochastic small base station (SBS) deployment on the energy efficiency (EE) and spectral efficiency (SE) of sparse code multiple access (SCMA)-based heterogeneous cellular networks (HCNs) is still ... -
Towards the Neuroevolution of Low-level artificial general intelligence
(Peer reviewed; Journal article, 2022)In this work, we argue that the search for Artificial General Intelligence should start from a much lower level than human-level intelligence. The circumstances of intelligent behavior in nature resulted from an organism ... -
I de sosiale ytterkantene. Konstruksjoner av kjønn og maskuliniteter hos norske menn i ufrivillig sølibat
(Peer reviewed; Journal article, 2022)Artikkelen handler om norske menn som identifiserer seg med å leve i ufrivillig sølibat. Det er en kvalitativ studie som tar utgangspunkt i intervjuer med syv norske menn, og gir ny kunnskap om et fenomen det er forsket ... -
A Novel Deep Transfer Learning Approach Based on Depth-Wise Separable CNN for Human Posture Detection
(Peer reviewed; Journal article, 2022)Human posture classification (HPC) is the process of identifying a human pose from a still image or moving image that was recorded by a digicam. This makes it easier to keep a record of people’s postures, which is helpful ... -
A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface
(Peer reviewed; Journal article, 2022)There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: ... -
Automatic Classification of Equivalent Mutants in Mutation Testing of Android Applications
(Peer reviewed; Journal article, 2022)Software and symmetric testing methodologies are primarily used in detecting software defects, but these testing methodologies need to be optimized to mitigate the wasting of resources. As mobile applications are becoming ... -
A machine learning-based intrusion detection for detecting internet of things network attacks
(Peer reviewed; Journal article, 2022)The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy ... -
A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous dataset
(Peer reviewed; Journal article, 2022)SMS, one of the most popular and fast-growing GSM value-added services worldwide, has attracted unwanted SMS, also known as SMS spam. The effects of SMS spam are significant as it affects both the users and the service ... -
Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study
(Peer reviewed; Journal article, 2022)Cyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly growing field. Although machine learning ... -
Behavior or culture? Investigating the use of cryptocurrencies for electronic commerce across the USA and China
(Peer reviewed; Journal article, 2022)Purpose – This paper claims to identify the behavioral and cultural features that push to use, or not, cryptocurrencies for electronic commerce. Indeed, despite the use of cryptocurrencies for electronic commerce spreading ...