ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: three
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
A Framework for Saudi Uniform Gait Recognition Based on Kinect Skeletal Tracking
Jawad H. Alkhateeb,Aiman Turani,Rashiq Marie,Aladdein Amro,Ahmad A. Mazhar
#Biometric system
#gait recognition
#kinect sensor
#KNN
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
A Framework for Saudi Uniform Gait Recognition Based on Kinect Skeletal Tracking
Jawad H. Alkhateeb,Aiman Turani,Rashiq Marie,Aladdein Amro,Ahmad A. Mazhar
#Biometric system
#gait recognition
#kinect sensor
#KNN
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
Evaluation Model of Athletes’ Lower Extremity Training Ability Based on LSTM Algorithm
Yuanyuan Gao,Qiang Qian,Xuefeng Sun,Jiankun An,Yutao Yuan
#Short-term memory network
#athletes
#lower extremity motor ability
#evaluation model
Simultaneously Identifying Opinion Targets and Opinion-bearing Words Based on Multi-Features in Chinese Micro-Blog Texts
Quanchao Liu,Heyan Huang,Chong Feng
#Opinion mining
#opinion target identification
#micro-blog
#feature-opinion pairs
#sentiment polarity
Saliency Detection for Content Aware Computer Vision Applications
Manipoonchelvi Pandivalavan,Muneeswaran Karuppiah
#Content aware processing
#saliency detection
#computational visual attention
Speech Scrambling based on Independent Component Analysis and Particle Swarm Optimization
Nidaa Abbas,Jahanshah Kabudian
#ICA
#itakura-saito distance
#LPC
#PSO
#speech scrambling
#SNR
Pattern Recognition Using the Concept of Disjoint Matrix of MIMO System
Mezbahul Islam,Rahmina Rubaiat,Imdadul Islam,Mostafizur Rahaman,Mohamed Ruhul Amin
#Uncoupled MIMO links
#eigenvalues
#unitary matrix
#noise and channel matrix
Image Compression based on Iteration-Free Fractal and using Fuzzy Clustering on DCT Coefficients
Sobia Mahalingam,Valarmathi Lakshapalam,Saranya Ekabaram
#Fractal image compression
#fuzzy clustering
#DCT coefficients
#contractive affine transformation
An Effective Management Model for Data Caching in MANET Environment
Amer Abu Salem
#MANET
#NS3
#admission control
#replacement strategy
#consistency strategy
An Effective Reference-Point-Set (RPS) Based Bi-Directional Frequent Itemset Generation
Ambily Balaram,Nedunchezhian Raju
#Reference point
#reference-point-set
#transactional buckets
#sparse region
#dense region
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
Design and Study of Zombie Enterprise Classification and Recognition Systems Based on Ensemble Learning
Shutong Pang,Ziwei Yang,Chengyou Cai,Zhimin Li
#Integrated learning
#corporate portrait
#classification and identification
#strong supervision model
Spatial and Semantic Information Enhancement for Indoor 3D Object Detection
Chunmei Chen,Zhiqiang Liang,Haitao Liu,Xin Liu
#3D object detection
#edge convolution
#attention mechanism
#spatial information
#semantic information
Generating Embedding Features Using Deep Learning for Ethnics Recognition
Mohammed Alghaili,Zhiyong Li,Ahmed AlBdairi,Malasy Katiyalath
#Computer vision
#machine learning
#ethnics identification
#deep learning
New Model of Feature Selection based Chaotic Firefly Algorithm for Arabic Text Categorization
Meryeme Hadni,Hassane Hjiaj
#Chaotic method
#firefly algorithm
#arabic text categorization
#feature selection
1
2
3
4
5
6
7
8
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint