ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: ENSIT
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Pattern Recognition Using the Concept of Disjoint Matrix of MIMO System
Mezbahul Islam,Rahmina Rubaiat,Imdadul Islam,Mostafizur Rahaman,Mohamed Ruhul Amin
#Uncoupled MIMO links
#eigenvalues
#unitary matrix
#noise and channel matrix
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
Joint Extraction of Organizations and Relations for Emergency Response Plans with Rich Semantic Information Based on Multi-head Attention Mechanism
Tong Liu,Haoyu Liu,Weijian Ni,Mengxiao Si
#Emergency plan
#entity-relation joint extraction
#deep learning
#attention mechanism
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
Optimization and Comparative Analysis of Quarter-Circular Slotted Microstrip Patch Antenna Using Particle Swarm and Fruit Fly Algorithms
Esin Karpat,Fatih Imamoglu
#Microstrip antenna design
#particle swarm optimization
#fruit fly optimization
Retina Disorders Classification via OCT Scan: A Comparative Study between Self-Supervised Learning and Transfer Learning
Saeed Shurrab,Yazan Shannak,Rehab Duwairi
#OCT images
#retina disorders
#self-supervised learning
#transfer learning
#resnet34
A Technique for Burning Area Identification Using IHS Transformation and Image Segmentation
Abstract: In this paper, we have designed and developed a tec hnique for burning area identification using Intensity Hue
#
Qaisar Abbas1, Irene Fondo´n2, and Emre Celebi3 1College of Computer and Information Sciences, Al Im am Mohammad Ibn Saud Islamic University,
#
Developing a Novel Approach for Content Based
#
Speed up of Reindexing in Adaptive Particle Swarm Optimization
#
Sri Venkateswara College of Engineering, India
#Image encryption
# modular addition
# chaotic maps
# l ogistic map
# socek
# grp
# cross
# block cipher
A Novel Fast Otsu Digital Image Segmentation
1
#
Spread Spectrum based Invertible Watermarking for Medical Images using RNS and Chaos
#
Neural Network with Bee Colony Optimization for MRI Brain Cancer Image Classification
#
Encryption Quality Measurement of a Proposed
#
Image Segmentation Based on Watershed and Edge Detection Techniques Nassir Salman
perform image segmentation and edge detection tasks. We obtained an initial segmentation based on K-means clustering
#Watershed
# difference in strength map
# K-means
# edge detection
# image segmentation
1
2
3
4
5
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint