ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: DL
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Joint Extraction of Organizations and Relations for Emergency Response Plans with Rich Semantic Information Based on Multi-head Attention Mechanism
Tong Liu,Haoyu Liu,Weijian Ni,Mengxiao Si
#Emergency plan
#entity-relation joint extraction
#deep learning
#attention mechanism
TSO Clustered Protocol to Extend Lifetime of IoT Based Mobile Wireless Sensor Networks
Giji Kiruba Dasebenezer,Benita Joselin
#MWSN
#clustering
#sensor nodes
#TSO
#PSO
A Comparative Study of Different Pre-Trained Deep Learning Models and Custom CNN for Pancreatic Tumor Detection
Muhammed Talha Zavalsız,Sleiman Alhajj,Kashfia Sailunaz,Tansel Ozyer,Reda Alhajj
#Deep learning
#medical image
#pancreatic tumor detection
#convolutional neural networks
#pancreatic ductal adenocarcinoma
An Adaptive Traffic Lights System using Machine Learning
Mohammad Ashraf Ottom,Ahmad Al-Omari
#Traffic time management
#image processing and objects detection
#vehicles dataset
An Effective Approach to Software Cost Estimation
1
#
A Safe Exit Approach for Continuous Monitoring
Department of Computer Engineering, Ajou University , South Korea
#
Using Textual Case-based Reasoning in Intelligent Fatawa QA System
which textual expertise is collected in a library o f past cases. One of the critical application domai ns is the Islamic Fatawa
#
Efficient Modified Elliptic Curve Diffie-Hellman
Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years.
#
Yang Ming1 and Yumin Wang2
#
Implementation of Image Processing System using Handover Technique with Map Reduce Based on Big Data in the Cloud Environment
#
Patching Assignment Optimization for Security
Department of Information Management, National Taiwan University, Taiwan
#
#
85
Player’s Prisoner’s Dilemma
#
An Intelligent CRF Based Feature Selection for
1
#
Curve Cryptography and its Variants
#
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks Essam Natsheh, Adznan Jantan, Sabira Khatun, and Shamala Subramaniam
paths between nodes within a network. Due to nodes mobility, the efficiency of a dynamic ad-hoc routing protocol depends
#Ad-hoc networks
# AODV
# beacon messages
# fuzzy systems
# intelligent networks
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc Essam Natsheh, Adznan B. Jantan, Sabira Khatun, and Shamala Subramaniam
powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic
#Active queue management
# ad-hoc networks
# fuzzy systems
# intelligent networks
# network congestion
Towards Ontology Extraction from Data-Intensive Web Sites: An HTML Forms-Based Reverse
1
# information search and retrieval
# online informati on services
# applications and expert systems
# seman tic web
# data- intensive web
# reverse engineering
VI-SDB: A Convivial Approach for Description and Manipulation of
Faculty of Sciences of Tunis, Tunisia University, T unisia
# Deductive database
# stratified database
# EPN formal ism
# GUI
1
2
3
4
5
6
7
8
»
All Rights reserved to IAJIT 2023
Powered by:
TurnPoint