ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: ANN
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Application of Decomposition Expression in Digital Video Object Segmentation
Jianfu Kong
#Video object segmentation
#unsupervised
#deep learning
#decomposing expression
#feature
#bottleneck operator
#foreground segmentation
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
A Neuro Phenotypic Evolution Algorithm for Recognizing Human Motion Type
Ivan Stepanyan,Safa Hameed
#Breaking up processes
#combining processes
#multi-dimensional data
#optimization
#phenotypic neuro-evolutionary
Curved Text Detection in Scenic Images via Proposal-Free Panoptic Segmentation and Deep Learning
Prachi Chhabra,Ali Abidi
#Deep learning
#image segmentation
#natural scene images
#multi-oriented text
#curved text detection
Unmanned Target Vehicle Navigation and Path Planning Using Improved Ant Colony Optimization Algorithm Combined with GPS/BDS
Rongli Cai
#Ant colony
#BDS
#GPS
#path planning
#unmanned target vehicle
A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
Laid Kenioua,Brahim Lejdel,Mohamed Abdelhamid Nedioui
#Autonomous vehicles
#positioning security
#secure communication
#semi-decentralized collaboration architecture
#edge computing
#data collection
#consensus
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction
Nur Aliah Syahmina Mohd Nazarudin,Nor Hapiza Mohd Ariffin,Ruhaila Maskat
#Stock price prediction
#machine learning
#synthetic data generation
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
ERDAP: A Novel Method of Event Relation Data Augmentation Based on Relation Prediction
Ruijuan Hu,Haiyan Liu,Wentao Yu
#Relation prediction
#event relation
#data augmentation
#graph convolutional networks
#causality extraction
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*
Jing Zhang,Guiyan Wei,Yonggong Ren
#Semi-supervised learning
#clustering
#auto-encoder network
#pair-wise
Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN
Reshma Vengaloor,Roopa Muralidhar
#Classification
#defect detection
#deep learning
#FRN structure
#yolov5
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Pattern Recognition Using the Concept of Disjoint Matrix of MIMO System
Mezbahul Islam,Rahmina Rubaiat,Imdadul Islam,Mostafizur Rahaman,Mohamed Ruhul Amin
#Uncoupled MIMO links
#eigenvalues
#unitary matrix
#noise and channel matrix
A Bi-Level Text Classification Approach for SMS Spam Filtering and Identifying Priority Messages
Naresh Kumar Nagwani
#SMS spam
#priority sms
#important sms
#sms spam filtering
#bi-level binary classification
Muzzle Classification Using Neural Networks
Ibrahim El-Henawy, Hazem El-bakry, and Hagar El-Hadad
#Muzzle classification
#image processing
#neural networks
A New (k, n) Secret Image Sharing Scheme (SISS)
Amitava Nag,Sushanta Biswas,Debasree Sarkar,Partha Sarkar
#complete graph
#spanning tree
#Prüfer sequence
#(k
# n) threshold secret image sharing
Smart City Application: Internet of Things (IoT) Technologies Based Smart Waste Collection Using Data Mining Approach and Ant Colony Optimization
Zeki Oralhan,Burcu Oralhan,Yavuz Yiğit
#Ant colony optimization
#data mining
#IoT smart device
#smart city
#smart waste management
1
2
3
4
5
6
7
8
9
10
11
12
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint