ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for:
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Construction of Educational Resource System Based on Mahout Collaborative Filtering Algorithm
Guiyong Zhu
#Multi-dimensional feature fusion
#collaborative filtering algorithm
#personalized recommendation
#educational resource system
#deep learning
A Bimodal Emotion Recognition Algorithm for Audio and Video Based on Emotion Modeling
Yang Liu,Shudan Feng,*Corresponding author
#Audio
#video
#fourier transform
#soundnet neural network
#recurrent neural network
#long and short-term memory network
Constrained Convolutional Neural Network Models for Optimizing Fully Connected Layer Weights in CNNs
Ugur Talas,Burakhan Cubukcu,Ugur Yuzgec
#Artificial intelligence
#image classification
#constrained
#convolutional neural network
#hyperparameter
#deep learning
Deep Learning-Based Degradation Detection and Inpainting of Tamil Nadu Temple Murals Using Transformer Networks and Diffusion Models
Ashwini Ramachandran,Vani Rajamanickam
#Art preservation
#cultural heritage conservation
#historical mural restoration
#degradation detection
#digital inpainting
#swin transformer
#stable diffusion
Low Carbon Scheduling in Manufacturing Workshops Taking into Account the Improvement of NSGA-II
Yanjun Zhou,Fei Wang
#Workshop low-carbon scheduling
#NSGA-II
#manufacturing industry
#multi-objective optimization
#elite retention strategy
Hybrid Transformer Framework for Domain Generated Algorithms Detection: A Fusion of Textual and Numeric Features
Suhad Malayshi,Ahmad Hasasneh*
#Domain generated algorithms
#cybersecurity
#hybrid deep learning
#text transformers
#multimodality
#feature importance
Enhancing Software Development Efficiency
Through User Stories Reuse from Application, Avril Hermawan, Badrus Zaman, Shukor Sanim Mohd Fauzi
#Application description
# requirements reuse
# requirements elicitation
# process innovation
# user story
Low Carbon Scheduling in Manufacturing Workshops Taking into Account the Improvement of NSGA-II
Yanjun Zhou,Fei Wang
#Workshop low-carbon scheduling
#NSGA-II
#manufacturing industry
#multi-objective optimization
#elite retention strategy
Hybrid Transformer Framework for Domain Generated Algorithms Detection: A Fusion of Textual and Numeric Features
Suhad Malayshi,Ahmad Hasasneh*
#Domain generated algorithms
#cybersecurity
#hybrid deep learning
#text transformers
#multimodality
#feature importance
Evaluation of Deep Learning Models for Remote Sensing Segmentation and Classification
SaiVenkataLakshmi Ananth,Suryakanth Gangashetty
#Semantic segmentation
#deep learning
#VGG16
#classification
#remote sensing
#densenet201-CNN
#U-net
#deeplabV3+
Evaluation of Deep Learning Models for Remote Sensing Segmentation and Classification
SaiVenkataLakshmi Ananth,Suryakanth Gangashetty
#Semantic segmentation
#deep learning
#VGG16
#classification
#remote sensing
#densenet201-CNN
#U-net
#deeplabV3+
Neural Volumetric Representations for Real-Time 3D Scene Reconstruction Using Multi-Modal
Learning Algorithm, Preeti Jha
#Deepvoxels
# neural rendering technique
# NeRF
# MMLA
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera Video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
An Effective Online Learning Course Recommendation Using Improved Deep Active Convolutional Neural Network Based Sentiment Analysis and Ranking
Roshan Bhanuse,Sandip Mal
#Text pre-processing
#feature extraction
#feature selection
#optimization
#sentiment analysis
#online learning
#recommendation
Arabic Language Characteristics that Make its Automatic Processing Challenging
Ilhem Boulesnam,Rabah Boucetti
#Computational linguistics
#natural language processing
#Arabic natural language processing
#Arabic characteristics
#Arabic language automation
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
1
2
3
4
5
6
7
8
9
10
61
62
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint