ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: degree
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
Solving QBF with Heuristic Small W orld
Abstract: In this paper, we use gaifman graph to describe the topological structure of the Quantified Boolean Formulae
#QBF
# SW
# search algorithm
# optimization algorithm
Pairwise Sequence Alignment using Bio-Database Compression by Improved Fine Tuned Enhanced Suffix Array
#
RPLB:A Replica Placement Algorithm inData Grid with Load Balancing
Abstract:Data gridisaninfrastructurebuilt based on internetwhichfacilitates sharing and management ofgeographically
#Replicaplacement
# load balancing
#ENU
# data grid
# data replication
An Innovative Two-Stage Fuzzy kNN-DST
1
#
Predicting the Existence of Design Patterns based
3
#
The International Arab Journal of Information Techn ology
in Cloud Computing
#
#
Yassine Benajiba2, Mona Diab2, and Paolo Rosso1 1Natural Language Engineering Laboratory, ELiRF, Uni versidad Politécnica Valencia, Spain
#Arabic natural language processing
# classification
# information extraction
# named entity recognition
#Clustering
# data mining
# dispersion
# multiple datab ases
# stability
Enhanced Clustering-Based Topic Identification of Transcribed Arabic Broadcast News
techniques. The enhancement includes applying new stemming technique “rule-based light stemming” to balance the negative
#Arabic speech transcription
# topic clustering
An Improved Statistical Model of Appearance under Partial Occlusion
Abstract: The Appearance Models (AMs) are widely used in many applications related to face recognition, expression
#Computer vision
# appearance model
# partial occlusion
# robust error functions
# CIECAM02 appearance model
Evaluation of Influence of Arousal-Valence Primitives on Speech Emotion Recognition
Abstract: Speech Emotion recognition is a challenging research problem with a significant scientific interest. There has been
#Speech emotion recognition
# arousal
# valence
# hierarchical classification
# gaussian mixture model
# support vector machine
A Multimedia Web Service Matchmaker Sid Midouni1,2, Youssef Amghar1, and Azeddine Chikh2 1Universit de Lyon, CNRS INSA-Lyon, France 2D partement d'informatique, Universit Abou Bekr Belkaid-Tlemcen, Alg rie
article, we show how MaaS services are matched to meet user needs. Our matching algorithm consists of two steps: (1) the
#Semantic web services
# information retrieval
# service description
# SAWSDL
# service matching
Immunity inspired Cooperative Agent based
Department of Computer Science and Engineering, Technocrats Institute of Technology, India
#Anomaly
# human immune system
# artificial immune system
# agent
PLDL: A Novel Method for Label Distribution Learning
Venkatanareshbabu Kuppili, Mainak Biswas, and Damodar Edla
#Multi-label classification
# data mining
# label distribution learning
# probability density function
Shamir s Key Based Confidentiality on Cloud Data Storage
Kamalraj Durai
#Confidentiality
# privacy
# cloud computing
# SKDC
# privacy preserving and polynomial interpolation
Polynomial Based Fuzzy Vault Technique for Template Security in Fingerprint Biometrics
Reza Mehmood and Arvind Selwal
#Biometrics
# Fingerprint
# Template Security
# Crypto-System
# Fuzzy vault
1
2
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint