ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: SHO
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
Turning Point Induced Knowledge Forecasting under Uncertainties (TrIK)
Jagtap Vinyak,Kulkarni Parag,Joshi Pallavi
#Time series forecasting
#shoulder area
#turning point
#knowledge discovery
#surprise
#uncertainty
Low Dimensional Multi Class Steganalysis of Spatial LSB based Stego Images Using Textural Features
Veena Sivasamy Thanasekaran,Arivazhagan Selvaraj
#Active steganalysis
#blind steganalysis
#statistical steganalysis
#multi class classifier
#spatial domain algorithms
#ensemble classifier
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
Turning Point Induced Knowledge Forecasting under Uncertainties (TrIK)
Jagtap Vinyak,Kulkarni Parag,Joshi Pallavi
#Time series forecasting
#shoulder area
#turning point
#knowledge discovery
#surprise
#uncertainty
Low Dimensional Multi Class Steganalysis of Spatial LSB based Stego Images Using Textural Features
Veena Sivasamy Thanasekaran,Arivazhagan Selvaraj
#Active steganalysis
#blind steganalysis
#statistical steganalysis
#multi class classifier
#spatial domain algorithms
#ensemble classifier
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Classification of Breast Cancer using Ensemble Filter Feature Selection with Triplet Attention Based Efficient Net Classifier
Bangalore Nagaraj Madhukar,Shivanandamurthy Hiremath Bharathi,Matta Polnaya Ashwin
#Breast cancer classification
#histopathology image
#ensemble filter feature selection
#triplet attention based EfficientNet
#TAENet
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
ERDAP: A Novel Method of Event Relation Data Augmentation Based on Relation Prediction
Ruijuan Hu,Haiyan Liu,Wentao Yu
#Relation prediction
#event relation
#data augmentation
#graph convolutional networks
#causality extraction
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
Mustafa Al-Fayoumi,Qasem Abu Al-Haija,Rakan Armoush,Christine Amareen
#Machine learning
#malicious PDF detection
#feature engineering
#explainable artificial intelligence
#shapley additive explanations
Evaluation Model of Athletes’ Lower Extremity Training Ability Based on LSTM Algorithm
Yuanyuan Gao,Qiang Qian,Xuefeng Sun,Jiankun An,Yutao Yuan
#Short-term memory network
#athletes
#lower extremity motor ability
#evaluation model
Real-Time Sign Language Fingerspelling Recognition using Convolutional Neural Network
Abiodun Oguntimilehin,Kolade Balogun
#Communication
#deep learning
#sign language
#hand gesture recognition
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
1
2
3
4
5
6
7
8
9
10
28
29
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint