ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: design
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Application of Video Game Algorithm Based on Deep Q-Network Learning in Music Rhythm Teaching
Shilian Zhang,Zheng Huang,Yalin Lang
#DQN network learning
#video game algorithms
#the rhythm of music
#teaching practice
EEG Signal Recognition of VR Education Game Players Based on Hybrid Improved Wavelet Threshold and LSTM
Yang Li,Haiyu Zhang
#EEG signal
#wavelet threshold method
#LSTM
#VR
#EEMD
Design and Implementation of Sports Network Teaching Platform Based on Discrete Similarity Method
Jian Cui,Lan Shi
#Adaptive savitzky-golay filtering
#chaotic satin bower bird optimization
#multi‐hypothesis fuzzy‐matching radon transform and sports network teaching
A Neuro Phenotypic Evolution Algorithm for Recognizing Human Motion Type
Ivan Stepanyan,Safa Hameed
#Breaking up processes
#combining processes
#multi-dimensional data
#optimization
#phenotypic neuro-evolutionary
English-Chinese Bilingual Teaching: A DECTMT-NBO-DMSFNN Approach for Design and Application of Machine Translation Technology
Yuwei Wang
#English
#chinese
#translation
#text
#language
#communication
#teaching
#bilingual
#vocabulary
#learning
#phrase
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
3D VAE Video Prediction Model with Kullback Leibler Loss Enhancement
Zahraa Al Mokhtar,Shefa Dawwd
#3D sampling stage
#kullback leibler loss
#temporal 3D sampling stage
#three dimensional RNN layers
#variational autoencoder
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
An Improved Classification Model for English Syntax Error Correction Design of DL Algorithm
Xue Han
#Universities
#English
#syntax error
#classification model
#neural network
#attention mechanism
From Neutrosophic Soft Set to Effective Neutrosophic Soft Set Generalizations and Applications
Sumyyah Al-Hijjawi,Abd Ghafur Ahmad,Shawkat Alkhazaleh
#Soft set
#neutrosophic soft set
#effective set
#effective fuzzy soft set
#effective neutrosophic soft set
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models
Abdelraouf Ishtaiwi,Ali Ali,Ahmad Al-Qerem,Yazan Alsmadi,Amjad Aldweesh,Mohammad Alauthman,Omar Alzubi,Shadi Nashwan,Awad Ramadan,Musab Al-Zghoul,Someah Alangari
#Data-augmentation
#objects detection
#brain tumor
#yolov7
#computer vision
Heart Disease Diagnosis Using Decision Trees with Feature Selection Method
Alaa Sheta,Walaa El-Ashmawi,Abdelkarim Baareh
#Machine learning
#classification
#decision tree
#heart disease
#diagnosis
Determining PolyCystic Ovarian Syndrome Severity from Reddit Posts using Topic Modelling and Association Rule Mining
Santhi Selvaraj,Selva Nidhyananthan Sundaradhas
#Association rule mining
#bag of words
#frequent symptoms set
#PCOS
#topic modelling
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*
Jing Zhang,Guiyan Wei,Yonggong Ren
#Semi-supervised learning
#clustering
#auto-encoder network
#pair-wise
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
Mustafa Al-Fayoumi,Qasem Abu Al-Haija,Rakan Armoush,Christine Amareen
#Machine learning
#malicious PDF detection
#feature engineering
#explainable artificial intelligence
#shapley additive explanations
1
2
3
4
5
6
7
8
9
10
11
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint