ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: DR
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Survival Prediction of Children after Bone Marrow Transplant Using Machine Learning Algorithms
Hussam Alawneh,Ahmad Hasasneh
#Bone marrow transplant
#hematopoietic stem cell
#random forest
#bagging
#adaboost
#gradient boost
#decision tree
#XGBoost
Narwhal Optimizer: A Novel Nature-Inspired Metaheuristic Algorithm
Seyyid Medjahed,Fatima Boukhatem
#Narwhal optimizer
#meta-heuristic
#optimization
#nature-inspired algorithms
#swarm intelligence
Determining PolyCystic Ovarian Syndrome Severity from Reddit Posts using Topic Modelling and Association Rule Mining
Santhi Selvaraj,Selva Nidhyananthan Sundaradhas
#Association rule mining
#bag of words
#frequent symptoms set
#PCOS
#topic modelling
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*
Jing Zhang,Guiyan Wei,Yonggong Ren
#Semi-supervised learning
#clustering
#auto-encoder network
#pair-wise
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
Real-Time Sign Language Fingerspelling Recognition using Convolutional Neural Network
Abiodun Oguntimilehin,Kolade Balogun
#Communication
#deep learning
#sign language
#hand gesture recognition
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Simultaneously Identifying Opinion Targets and Opinion-bearing Words Based on Multi-Features in Chinese Micro-Blog Texts
Quanchao Liu,Heyan Huang,Chong Feng
#Opinion mining
#opinion target identification
#micro-blog
#feature-opinion pairs
#sentiment polarity
Saliency Detection for Content Aware Computer Vision Applications
Manipoonchelvi Pandivalavan,Muneeswaran Karuppiah
#Content aware processing
#saliency detection
#computational visual attention
Using Machine Learning Techniques for Subjectivity Analysis based on Lexical and Non-lexical Features
Hikmat Ullah Khan,Ali Daud
#Machine Learning
#classification
#opinion mining
#lexicon
#non-lexical features
1
2
3
4
5
6
7
8
9
10
13
14
ยป
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint