ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: (m
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
A Novel Adaptive ANC Algorithm for Removal of Background Noise in Speech Applications
Vinothkumar.G,Manoj Kumar.D
#ANC
#FxNLMS
#NIHL
#speech enhancement
#background noise cancellation
#MSE
#SNRi
#PESQ and STOI
From Neutrosophic Soft Set to Effective Neutrosophic Soft Set Generalizations and Applications
Sumyyah Al-Hijjawi,Abd Ghafur Ahmad,Shawkat Alkhazaleh
#Soft set
#neutrosophic soft set
#effective set
#effective fuzzy soft set
#effective neutrosophic soft set
Heart Disease Diagnosis Using Decision Trees with Feature Selection Method
Alaa Sheta,Walaa El-Ashmawi,Abdelkarim Baareh
#Machine learning
#classification
#decision tree
#heart disease
#diagnosis
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahouat,Manar Abourezq,Najima Daoudi
#ANLP
#feature extraction
#word embedding
#BERT
#transformers
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahouat,Manar Abourezq,Najima Daoudi
#ANLP
#feature extraction
#word embedding
#BERT
#transformers
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
A Dual-Objective Approach for Allocation of Virtual Machine with improved Job Scheduling in Cloud Computing
Sandeep Sutar,Manjunathswamy Byranahallieraiah,Kumarswamy Shivashankaraiah
#Cloud computing
#job scheduling
#VM scheduling
#cost optimization
#energy utilization
#dual objectives
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN
Reshma Vengaloor,Roopa Muralidhar
#Classification
#defect detection
#deep learning
#FRN structure
#yolov5
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
Mustafa Al-Fayoumi,Qasem Abu Al-Haija,Rakan Armoush,Christine Amareen
#Machine learning
#malicious PDF detection
#feature engineering
#explainable artificial intelligence
#shapley additive explanations
An Unsupervised Feed Forward Neural Network Method for Efficient Clustering
Roya Asadi,Mitra Asadi,Shokoofeh Asadi
#Artificial neural network
#feed forward neural network
#unsupervised learning
#clustering
#real weight
An Efficient Perceptual of CBIR System using MIL-SVM Classification and SURF Feature Extraction
Bhuvana Shanmugam,Radhakrishnan Rathinavel,Tamije Perumal,Subhakala Subbaiyan
#SURF
#MIL-SVM
#LBG
#HI
An Effective Management Model for Data Caching in MANET Environment
Amer Abu Salem
#MANET
#NS3
#admission control
#replacement strategy
#consistency strategy
A Novel Resource Scheduler for Resource Allocation and Scheduling in Big Data Using Hybrid Optimization Algorithm at Cloud Environment
Aarthee Selvaraj,Prabakaran Rajendran,Kanimozhi Rajangam
#Resource management
#particle swarm optimization
#computer performance
#data analysis
#virtualization
Joint Extraction of Organizations and Relations for Emergency Response Plans with Rich Semantic Information Based on Multi-head Attention Mechanism
Tong Liu,Haoyu Liu,Weijian Ni,Mengxiao Si
#Emergency plan
#entity-relation joint extraction
#deep learning
#attention mechanism
1
2
3
4
5
6
7
8
9
10
11
ยป
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint