


default search action
IT Professional, Volume 26
Volume 26, Number 1, January - February 2024
- Charalampos Z. Patrikakis

:
Jubilee Welcome: Celebrating 25 Years! 4-7 - Sorel Reisman

:
The Beginnings of IT Professional - A Personal Retrospective. 8-9 - Nir Kshetri

:
Monetizing Quantum Computing. 10-15 - George O. Strawn

:
The Mastermind Department Wishes IT Professional a Happy 25th Birthday! 16-18 - Kirk Bresniker

, Paolo Faraboschi
, Eitan Frachtenberg
, Dejan S. Milojicic
, Phil Laplante
, Nita Patel
, Roberto Saracco
:
What Gets You Hired Now Will Not Get You Hired Then. 26-31 - Ioannis Tomkos

, Christos Christofidis
, Dimitris Uzunidis
, Konstantinos Moschopoulos
, Charalampos Papapavlou
, Christos Tranoris
, Dan M. Marom
, Moshe Nazarathy, Raul Muñoz
, Panagiotis Famelis
, David Larrabeiti
:
The "X-Factor" of 6G Networks: Optical Transport Empowering 6G Innovations. 32-39 - Spyros Fountas

, Borja Espejo-García
, Aikaterini Kasimati
, Marilena Gemtou
, Hercules Panoutsopoulos
, Evangelos Anastasiou
:
Agriculture 5.0: Cutting-Edge Technologies, Trends, and Challenges. 40-47 - Henry E. Schaffer

:
Will Algorithms Rule Us? 48-49 - Gregory M. Provan

:
Formal Methods for Autonomous Vehicles. 50-56 - Stephen J. Andriole

:
How Good Is the Team? 57-59 - Irena Bojanova

:
Comprehensively Labeled Weakness and Vulnerability Datasets via Unambiguous Formal Bugs Framework Specifications. 60-68 - George F. Hurlburt

, Amir Dabirian
:
Why IT Lessons Matter. 19-25
Volume 26, Number 2, March - April 2024
- George F. Hurlburt

:
An Ethical Trio - AI, Cybersecurity, and Coding at Scale. 4-9 - Stephen J. Andriole

:
Who's Doing the Work? What C-Suites Should Know About Sourcing. 10-12 - George O. Strawn

:
Masterminds of Generative AI: Vaswani and Altman. 13-16 - Byungseok Kang

, Youngjae Jo:
StyleGAN-Based Advanced Semantic Segment Encoder for Generative AI. 17-23 - Luca Piano

, Fabio Garcea
, Andrea Cavallone
, Ignacio Aparicio Vazquez, Lia Morra
, Fabrizio Lamberti
:
Drift Detection for Black-Box Deep Learning Models. 24-31 - Vishal Maniyal

, Vijay Kumar
:
Unveiling the Deepfake Dilemma: Framework, Classification, and Future Trajectories. 32-38 - Priyanka Rani

, Abhijit Kumar Nag
, Rifat Shahriyar
:
A Data-Driven Classification Framework for Cybersecurity Breaches. 39-48 - Yunwu Xu

, Yan Li
:
A New Method of Security Bug Reports Analysis. 49-56 - Mohamed Saied Essa

, Ahmed Mohamed Elfatatry
, Shawkat Kamal Guirguis
:
Conceptual Framework for Software Change. 57-66 - Mercedes Ruiz

, Elena Orta
, Javier Jesus Gutiérrez Rodriguez
:
A Gamification Method for Improving the Onboarding Process of Software Engineers. 67-75 - Andrei A. Ternikov

:
Company Name Matching Using Job Market Data Enrichment. 76-82 - Caitlin Ferreira

, Andrew Park
, Jan Kietzmann
, Dionysios S. Demetis
, Andrew Flostrand
, Ian P. McCarthy
, Leyland F. Pitt, Amir Dabirian:
Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs. 83-89 - Nir Kshetri

:
Navigating the Landscape of Generative AI: Investment Trends, Industry Growth, and Economic Effects. 90-96
Volume 26, Number 3, May - June 2024
- Dimitrios G. Kogias

, Charalampos Z. Patrikakis
:
Beyond Bitcoin: Exploring the Expanding Horizons of Blockchain Innovation. 4-8 - Nir Kshetri

:
The Environmental Impact of Artificial Intelligence. 9-13 - Peter Mell

, Irena Bojanova
, Carlos Eduardo Galhardo
:
Measuring the Exploitation of Weaknesses in the Wild. 14-21 - Julián Alberto García-García

, Nicolás Sánchez-Gómez
, María José Escalona
, Mercedes Ruiz
:
COTriage: Applying a Model-Driven Proposal for Improving the Development of Health Information Systems with Chatbots. 22-31 - Hazim Shakhatreh

, Waed Malkawi
, Ala I. Al-Fuqaha
:
An Optimization Perspective on the Interactions Between Models in the Internet of Drones. 32-45 - Sana Nasim Karam

, Kashif Bilal
, Junaid Shuja
, Latif U. Khan
, Muhammad Bilal
, Muhammad Khurram Khan
:
Intelligent IoT- and UAV-Assisted Architecture for Pipeline Monitoring in OGI. 46-54 - Francesco Alotto, Matteo Del Giudice

, Roberta Surian, Nicola Rimella
, Andrea Acquaviva
, Edoardo Patti
, Anna Osello
:
Hospital and Home Environments Automation for Amyotrophic Lateral Sclerosis Patients: Building Information Modeling and the Internet of Things in Digital Environments. 55-64 - Hung-Tse Chiang

, Bor-Yao Tseng
, Jiann-Liang Chen
, Han-Chuan Hsieh:
Trajectory Analysis in UKF: Predicting Table Tennis Ball Flight Parameters. 65-72 - Eirini-Eleni Tsiropoulou

, Aisha B. Rahman
, Md. Sadman Siraj
:
HELIOCOMM: A Wireless Revolution in Concentrated Solar Power Systems. 73-79 - Wahyu Rahmaniar

:
ChatGPT for Software Development: Opportunities and Challenges. 80-86 - Ellis Solaiman

, Christa Awad:
Trust and Dependability in Blockch-AI-n-Based Medical Internet of Things Applications: Research Challenges and Future Directions. 87-93 - Noah P. Barsky

:
Can AI Fix Distracted CFO Syndrome? It's Still an Open Question. 94-98 - George O. Strawn

:
Where Deep Learning and Generative AI Started: Masterminds of Artificial Neural Networks - McCulloch, Pitts, and Rosenblatt. 99-101
Volume 26, Number 4, July - August 2024
- Dimitrios G. Uzunidis

, Charalampos Z. Patrikakis
:
The 6G Era: What It Takes to Add Another G. 4-8 - Sorel Reisman

:
COMPSAC 2024: A Resounding Success. 9-13 - Bhuvan Unhelkar

, Sumit Chakravarty
, Tamaghna Acharya
:
Revisiting Rural and Remote Connectivity Challenges in B5G and 6G Networks. 14-16 - Arun Kumar

, Himanshu Sharma
, Nishant Gaur
, Nidhi Gour
:
PAPR Analysis of 5G and B5G Waveforms Using Advanced PAPR Algorithms. 17-21 - P. Deepanramkumar

, A. Helen Sharmila
, Niranchana Radhakrishnan
, Devulapalli Sudheer
, Jeethu V. Devasia
, Ch. Pradeep Reddy
, Gokul Yenduri
, N. Jaisankar
:
Enhancing Connectivity in Rural Areas: Secure Spectrum Access in 6G Networks Using Advanced Encryption and Spectrum Sensing Techniques. 22-28 - Imtiaz Ahmed

, Md. Zoheb Hassan
, Majumder Haider
, Kamrul Hasan
:
Integrated Cellular and Cell-Free Communication Systems Toward Global Connectivity: Motivations, Challenges, and Research Roadmap. 29-35 - Manuel Jesús-Azabal

, José García-Alonso
, Jaime Galán-Jiménez
:
Beyond 5G Satellite Transmission and Indoor UAVs in Dams Monitoring: An Opportunistic Data Collection Strategy for Isolated Rural Areas. 36-41 - Vivek Kant

, Sanjram Premjit Khanganba
, Sudhir Dixit
:
Sociopolitical Challenges to Digital Transformation of Rural Communities: Learnings from a Case Study From Manipur, India. 42-47 - Yi-Wei Ma

, Yen-Neng Chiang
:
A Postdisaster Network Resource Allocation in a Mobile Communication Network. 48-54 - Xuefeng Xie

, Wanyi Zhang
, Lin Wang
:
4W1H in Resource Distribution in Artificial Intelligence for Emergency Logistics. 55-61 - Alessandro Armellin

, Roberto Caviglia
, Giovanni Battista Gaggero
, Mario Marchese
:
A Framework for the Deployment of Cybersecurity Monitoring Tools in the Industrial Environment. 62-70 - Rafal Leszczyna

:
Cybersecurity Assessment Methods - Why Aren't They Used? 71-79 - Rubén Hortelano-Haro

, José A. Mateo-Cortés
, María Blanca Caminero-Herráez
, Enrique Arias-Antúnez
, Ángel Hernández-Bravo
, Diego Dujovne
:
Harnessing Blockchain Technology to Enhance Trust and Traceability in Wine Trading Among Wineries. 80-88 - Stephen J. Andriole

:
What Executives Should See in the Mirror (Part 1). 89-91 - Amir Dabirian

, Su Swarat
:
Artificial Intelligence in Higher Education: Community Perceptions at a Large U.S. University. 92-96 - Nir Kshetri

:
Empowering African Development: The Transformative Potential of Artificial Intelligence Across Sectors. 97-103
Volume 26, Number 5, September - October 2024
- George F. Hurlburt

, Charalampos Z. Patrikakis
:
A New Lexicon and Its Implications. 4-11 - Stephen J. Andriole

:
What Executives Should See in the Mirror (Part 2). 12-14 - Nir Kshetri

:
Generative AI in Advertising. 15-19 - Rasmus Ros

, Per Runeson
, Elizabeth Bjarnason
:
Evidence-Based Guidelines for Advancing Continuous Experimentation. 20-27 - In Lee

:
The Metaverse: Ecosystem, Technologies, Business Opportunities, and Challenges. 28-35 - Abdul Majeed

, Seong Oun Hwang
:
Integrating Curriculum Learning With k-Means: A Data-Centric Approach to Faster Clustering. 36-46 - Yao-Hsin Chou

, Chien-Ming Chen
, Yun-Ting Lai
, Shu-Yu Kuo
, Yu-Chi Jiang
, Fan-Hsun Tseng
:
Enhancing Aluminum Extrusion Quality via AI-Driven Temperature Prediction in Cyberphysical Systems for Industry 4.0. 47-54 - Javier Conde

, Jose Andrés Muñoz-Arcentales
, Álvaro Alonso
, Joaquín Salvachúa
, Gabriel Huecas
:
Enhanced FIWARE-Based Architecture for Cyberphysical Systems With Tiny Machine Learning and Machine Learning Operations: A Case Study on Urban Mobility Systems. 55-61 - Mariam Ishtiaq

, Nasir Saeed
, Muhammad Asif Khan
:
Edge Computing in the Internet of Things: A 6G Perspective. 62-70 - Wanyi Zhang

, Fei Meng
, Chengwu Liao
, Chao Chen
:
Enabling Smart Mobility for People and Beyond With Heterogeneous Trajectory Data. 71-78 - Antonio Corradi

, Andrea Sabbioni
:
Serverless Computing for Society 5.0. 79-84 - Hassan Keshavarz

, Maryam Nematigavzan
, Neda Jalaliyoon
, Mohammadreza Nouri
:
Phenomenon of Fake Agile in Software Development. 85-91 - Amandeep Singh

, Tiziana Margaria
:
Enhancing Decision-Making for Imbalanced Medical Datasets Using BDDs and Low-Code/No-Code. 92-98
Volume 26, Number 6, November - December 2024
- Christoforos Kachris

, Charalampos Z. Patrikakis
:
The Rise of Accelerator-Based Data Centers: Opportunities and Challenges. 4-9 - Yulu Du

, Nicholas Svizzero
, Pierre Berthon
:
Understanding Ageism in Tech: A Model and Propositions. 10-17 - George O. Strawn

:
Mastermind of the Future: Ray Kurzweil. 18-20 - Senthil Kumar Jagatheesaperumal

, Praveen Sathikumar, Harikrishnan Rajan:
MetaDigiHuman: Haptic Interfaces for Digital Humans in the Metaverse. 21-27 - John Owoicho Odeh

, Xiaolong Yang
:
Industrial-Internet-of-Things-Based Digital Twin and Metaverse Privacy and Security Measures for a Trustworthy Industrial Metaverse Ecosystem. 28-34 - Sakshi Patni

, Sungpil Woo
, Joohyung Lee
:
Predictive Dynamic Virtual Machine Scaling for Federated Learning Over Edge-Cloud Interworking. 35-44 - Mohamed Saied Essa

, Shawkat Kamal Guirguis
, Magda M. Madbouly
:
IoT Cybersecurity: On the Use of Boosting-Based Approaches for Botnet Detection. 45-54 - Sumitra Nuanmeesri

:
Spectrum-Based Hybrid Deep Learning for Intact Prediction of Postharvest Avocado Ripeness. 55-61 - Amina Djoudi

, Younes Guellouma
, Hadda Cherroun
, Bouziane Brik
:
A Scalable Federated Modular Neural Network Architecture for Edge-Enabled Beyond-5G Complex Systems. 62-69 - Divya Gupta

, Shalli Rani
, Thippa Reddy Gadekallu
:
Blockchain-Based Semantic Exchange Framework for Summarized Video Contents in Wireless Edge Intelligence Network Enabled Web 3.0. 70-76 - Yong Zhang, Yan Luo, Wenwu Ling, Ying Zhu, Xiao Lu:

ChatGPT in Ultrasound Medicine: Potential Applications and Challenges. 77-83 - Nir Kshetri

, Diana Rojas-Torres
, Mamduh M. Hanafi
, Mousa Al-Kfairy
, Gayle O'Keefe
, Nathan Feeney
:
Harnessing Generative Artificial Intelligence: A Game-Changer for Small and Medium Enterprises. 84-89 - Noah P. Barsky

:
Reveal or Conceal: Should Executives Know (Or Care) About Digital Era Proxy Statement Disclosures? 90-93

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














