EconPapers    
Economics at your fingertips  
 

International Journal of Information Technology and Web Engineering (IJITWE)

2006 - 2025

Current editor(s): Ghazi I. Alkhatib

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 20, issue 1, 2025

Analysis of Design Patterns Available for the Implementation of Applications in Xamarin pp. 1-30 Downloads
Edwin Norbey Gómez Bello and Miguel Angel Leguizamón Páez
Dynamic Econometric Analysis of Supply Chain Relationship Between China and Five Continents Based on Time Series Regression Model pp. 1-20 Downloads
Cheng Zhang, Ni Hu and Jilu Liu

Volume 19, issue 1, 2024

Application of QGA-BP Neural Network in Debt Risk Assessment of Government Platforms pp. 1-18 Downloads
Qingping Li, Ming Liu and Yao Zhang
Personalized Recommendation Method of E-Commerce Products Based on In-Depth User Interest Portraits pp. 1-15 Downloads
Jingyi Li and Shaowu Bao
Exploration of College Students' Learning Adaptability Under the Background of Wisdom Education pp. 1-12 Downloads
Henan Zhang and Xiangzhe Liu
Research on VRP Model Optimization of Cold Chain Logistics Under Low-Carbon Constraints pp. 1-14 Downloads
Ruixue Ma and Qiang Zhu
Quantitative Evaluation Method of Psychological Quality of College Teachers Based on Fuzzy Logic pp. 1-19 Downloads
Liangqun Yang and Jian Li
Emotional Behavior Analysis of Music Course Evaluation Based on Online Comment Mining pp. 1-20 Downloads
Nan Li
Securities Quantitative Trading Strategy Based on Deep Learning of Industrial Internet of Things pp. 1-16 Downloads
Yi Tang, Xiaoning Wang and Wenyan Wang

Volume 18, issue 1, 2023

A Meta-Analysis of Facebook-Assisted Learning Outcomes in Different Countries or Regions pp. 1-18 Downloads
Liheng Yu, Wei Xu, Paisan Sukjairungwattana and Zhonggen Yu
Data Collection and Analysis in Physical Education Practical Teaching Based on Internet of Things pp. 1-15 Downloads
Yang Xu and Min Liu
Evaluating the User Interface and Usability Approaches for E-Learning Systems pp. 1-25 Downloads
Jehad Saad Alqurni
Deep Semantic-Level Cross-Domain Recommendation Model Based on DSV-CDRM pp. 1-20 Downloads
Xuewei Lai and Qingqing Jie
Influence of Agriculture M(i) Services on Rice Planting Costs on Chinese Family Farms pp. 1-19 Downloads
Zhang Cheng and Ni Hu
Predicting the Success of a Startup in Information Technology Through Machine Learning pp. 1-17 Downloads
Edilberto Vasquez, José Santisteban and David Mauricio
Sports Work Strategy of College Counselors Based on MySQL Database Big Data Analysis pp. 1-14 Downloads
Xiao Zhang, Ali Yu, Xin Wang and Xue Zhang
Assessing the Usability of E-Learning Software Among University Students: A Study on Student Satisfaction and Performance pp. 1-26 Downloads
Jehad Alqurni
The Construction of Network Domain Name Security Access Identification System Based on Artificial Intelligence pp. 1-13 Downloads
Lin Li
Echo State Network-Based Content Prediction for Mobile Edge Caching Networks pp. 1-16 Downloads
Zengyu Cai, Xi Chen, Jianwei Zhang, Liang Zhu and Xinhua Hu
Implementation of a Web Application and GIS Electronic Atlas for Teaching in Open Education pp. 1-23 Downloads
Saule Kairollovna Damekova, Lyubov Nikolaevna Karassyova, Nurlan Amirovich Medetov, Zamzagul Manapovna Ozhibayeva and Bozhidar Tsvetkov

Volume 17, issue 1, 2022

An Attendance System Using the Face Extraction and Recognition Technique Using PCA Algorithm pp. 1-10 Downloads
Mazin S. Mohammed and Raya Basil Alothman
Extracting Entity Synonymous Relations via Context-Aware Permutation Invariance pp. 1-17 Downloads
Nan Yan, Subin Huang and Chao Kong
Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach pp. 1-20 Downloads
Romil Rawat, Sanjaya Kumar Sarangi, Yagya Nath Rimal, P. William, Snehil Dahima, Sonali Gupta and K. Sakthidasan Sankaran
SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches pp. 1-19 Downloads
Romil Rawat, Bhagwati Garg, Kiran Pachlasiya, Vinod Mahor, Shrikant Telang, Mukesh Chouhan, Surendra Kumar Shukla and Rina Mishra
Binary Self-Adaptive Salp Swarm Optimization-Based Dynamic Load Balancing in Cloud Computing pp. 1-25 Downloads
Bivasa Ranjan Parida, Amiya Kumar Rath and Hitesh Mohapatra
Winning the War on Terror: Using “Top-K” Algorithm and CNN to Assess the Risk of Terrorists pp. 1-15 Downloads
Yaojie Wang, Xiaolong Cui and Peiyong He
An Integrated Remote Control-Based Human-Robot Interface for Education Application pp. 1-18 Downloads
Xue-xi Duan, Yun-ling Wang, Wei-shan Dou, Rajeev Kumar and Nitin Saluja
Smart Contracts Security Threats and Solutions pp. 1-30 Downloads
Senou Mahugnon Rosaire and Degila Jules
On Cost-Aware Heterogeneous Cloudlet Deployment for Mobile Edge Computing pp. 1-23 Downloads
Hengzhou Ye, Fengyi Huang and Wei Hao
Research on System Risks of “Internet + Supply Chain Finance” Based on SNA, Dynamic Evolutionary Game, and Bayesian Learning Principle Simulation pp. 1-16 Downloads
Ji Lu Liu, Ni Hu and Cheng Zhang
Microclustering-Based Multi-Class Classification on Imbalanced Multi-Relational Datasets pp. 1-13 Downloads
Hemlata Pant and Reena Srivastava
Relationship Between Personality Patterns and Harmfulness: Analysis and Prediction Based on Sentence Embedding pp. 1-24 Downloads
Kazuyuki Matsumoto, Ryota Kishima, Seiji Tsuchiya, Tomoki Hirobayashi, Minoru Yoshida and Kenji Kita
Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML pp. 1-11 Downloads
Dharmendra Kumar Singh Singh, Nithya N., Rahunathan L., Preyal Sanghavi, Ravirajsinh Sajubha Vaghela, Poongodi Manoharan, Mounir Hamdi and Godwin Brown Tunze
Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology pp. 1-14 Downloads
Sekar S., Annamalai Solayappan, Srimathi J., S. Raja, Durga S., Poongodi Manoharan, Mounir Hamdi and Godwin Brown Tunze
A Secure Data Transfer Approach With an Efficient Key Management Over Cloud pp. 1-21 Downloads
Lalit Mohan Gupta, Hitendra Garg and Abdus Samad

Volume 16, issue 4, 2021

Deadline-Constrained Cost-Effective Load-Balanced Improved Genetic Algorithm for Workflow Scheduling pp. 1-34 Downloads
Sandeep Kumar Bothra, Sunita Singhal and Hemlata Goyal
A Long Short-Term Memory Neural Network for Daily NO2 Concentration Forecasting pp. 35-51 Downloads
Bingchun Liu, Xiaogang Yu, Qingshan Wang, Shijie Zhao and Lei Zhang
An Improved Sentiment Analysis Approach to Detect Radical Content on Twitter pp. 52-73 Downloads
kamel Ahsene Djaballah, Kamel Boukhalfa, Omar Boussaid and Yassine Ramdane
Conventional and Evolutionary Order Reduction Techniques for Complex Systems pp. 74-98 Downloads
Abha Kumari and C. B. Vishwakarma

Volume 16, issue 3, 2021

FaD-CODS Fake News Detection on COVID-19 Using Description Logics and Semantic Reasoning pp. 1-20 Downloads
Kartik Goel, Charu Gupta, Ria Rawal, Prateek Agrawal and Vishu Madaan
Analyzing Linguistic Features for Classifying Why-Type Non-Factoid Questions pp. 21-38 Downloads
Manvi Breja and Sanjay Kumar Jain
A Robust Lightweight Data Security Model for Cloud Data Access and Storage pp. 39-53 Downloads
Pajany M. and Zayaraz G.
An Adaptable Secure Scheme in Mobile Ad hoc Network to Protect the Communication Channel From Malicious Behaviours pp. 54-73 Downloads
Srilakshmi R. and Jaya Bhaskar M.

Volume 16, issue 2, 2021

WDPMA: An MA-Based Model for Web Documents Prioritization pp. 1-24 Downloads
Santosh Kumar and Ravi Kumar
An Integer Linear Programming-Based Method for the Extraction of Ontology Alignment pp. 25-44 Downloads
Naima El Ghandour, Moussa Benaissa and Yahia Lebbah
Towards Efficient Big Data Storage With MapReduce Deduplication System pp. 45-57 Downloads
Vijesh Joe, Jennifer S. Raj and Smys S.
A Detector and Evaluation Framework of Abnormal Bidding Behavior Based on Supplier Portrait pp. 58-74 Downloads
Xinqiang Ma, Xuewei Li, Baoquan Zhong, Yi Huang, Ye Gu, Maonian Wu, Yong Liu and Mingyi Zhang

Volume 16, issue 1, 2021

Programmable Implementation and Blockchain Security Scheme Based on Edge Computing Firework Model pp. 1-22 Downloads
Bao Yi Qin, Zheng Hao and Zhao Qiang
A New Pedestrian Feature Description Method Named Neighborhood Descriptor of Oriented Gradients pp. 23-55 Downloads
Qian Liu, Feng Yang and XiaoFen Tang
Spectral-Spatial Classification of Hyperspectral Image Based on Support Vector Machine pp. 56-74 Downloads
Weiwei Yang and Haifeng Song
Research and Application of a Multidimensional Association Rules Mining Method Based on OLAP pp. 75-94 Downloads
Hairong Wang, Pan Huang and Xu Chen
Page updated 2025-04-15