ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: power
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
Empowering Ovarian Cancer Subtype Classification with Parallel Swin Transformers and WSI Imaging
Lubna ALkahla,Jwan Saeed,Maher Hussein
#Ovarian cancer
#Swin-transformer
#sub-type classification
#histology image analysis
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Evaluation of Emission Reduction Performance of Power Enterprises Based on Least Squares Support Vector Machine
Wanqing Zhang,Ruohan Huang,Luwei Ye
#Power generation enterprise
#evaluation indicators
#least squares support vector machine
#Lion swarm optimization algorithm
#chaos theory
RSO based Optimization of Random Forest Classifier for Fault Detection and Classification in Photovoltaic Arrays
Khaled Baradieh,Mohd Zainuri,Mohamed Kamari,Yushaizad Yusof,Huda Abdullah,Mohd Zaman,Mohd Zulkifley
#Classifier
#diagnosis
#fault classification
#fault detection
#machine learning
#optimization
#photovoltaic
#pv
#random forest
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahouat,Manar Abourezq,Najima Daoudi
#ANLP
#feature extraction
#word embedding
#BERT
#transformers
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahouat,Manar Abourezq,Najima Daoudi
#ANLP
#feature extraction
#word embedding
#BERT
#transformers
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Classification of Breast Cancer using Ensemble Filter Feature Selection with Triplet Attention Based Efficient Net Classifier
Bangalore Nagaraj Madhukar,Shivanandamurthy Hiremath Bharathi,Matta Polnaya Ashwin
#Breast cancer classification
#histopathology image
#ensemble filter feature selection
#triplet attention based EfficientNet
#TAENet
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*
Jing Zhang,Guiyan Wei,Yonggong Ren
#Semi-supervised learning
#clustering
#auto-encoder network
#pair-wise
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
A Novel Codebook Generation by Smart Fruit Fly Algorithm based on Exponential Flight
Ilker Kilic
#Metaheuristic optimization technique
#fruit fly algorithm
#image compression
#codebook generation
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
Finger Knuckle Print Authentication Using AES
1
#
Kernel Logistic Regression Algorithm for Large Scale Data Classification
classification problems. However, it is often not f ound in large+scale data classification problems an d this is mainly because it
#
Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID
#Low*cost RFID
# cryptography
# protocol
# vulnerabilit y
1
2
3
4
5
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint