ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for:
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Forecasting the Spread of Viral Diseases in Jordan Using the SARIMA Statistical Model
Shahed Al-khateeb
#Time series model
#Jordan
#prediction
#diseases
#forecasting model
#sarimax
#seasonal autoregressive integrated moving-average with exogenous regressors
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
Review of Agile SDLC for Big Data Analytics Systems in the Context of Small Organizations Using Scrum-XP
Gerardo Salazar-Salazar,Manuel Mora,Hector Duran-Limon,Francisco Alvarez-Rodriguez,Angel Munoz-Zavala
#Big data analytics systems
#agile system development life cycle
#Scrum-XP
#CRISP-DM
#TDSP and DDSL
#small business
Improvement of Translation Accuracy for the Word Sense Disambiguation System using Novel Classifier Approach
Ajith Abraham,Bineet Kumar Gupta,Satya Bhushan Verma,Archana Sachindeo Maurya,Mohammad Husain,Arshad Ali,Sami Alshmrany,Sanjay Gupta
#Bayes theorem
#machine learning
#machine translation
#naïve bayes classification
#supervised approach
#unsupervised approach
#and word sense disambiguation
Nature-Inspired Metaheuristic Algorithms: A Comprehensive Review
Mohammad Shehab,Rami Sihwail,Mohammad Daoud,Hani Al-Mimi,Laith Abualigah
#Optimization algorithms
#metheuristic algorithms
#heuristic strategies
#local search techniques
#global search techniques
Image Encryption Using Modified Perturbed Logistic Map
Subhashini Kumaran,Amutha Ramachandran
#Improved zig zag transformation
#image encryption
#decoding
#DNA operations
#modified perturbed logistic map
#quaternary DNA encoding
3D VAE Video Prediction Model with Kullback Leibler Loss Enhancement
Zahraa Al Mokhtar,Shefa Dawwd
#3D sampling stage
#kullback leibler loss
#temporal 3D sampling stage
#three dimensional RNN layers
#variational autoencoder
A Novel Crossover based Discrete Artificial Algae Algorithm for Solving Traveling Salesman Problem
Refik Nureddin,Ismail Koc,Sait Ali Uymaz
#Artificial algae algorithm
#traveling salesman problem
#crossover operator
#transformation operators
#discrete optimization
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
Laid Kenioua,Brahim Lejdel,Mohamed Abdelhamid Nedioui
#Autonomous vehicles
#positioning security
#secure communication
#semi-decentralized collaboration architecture
#edge computing
#data collection
#consensus
Hybridized Clustering Algorithm and Ensemble Learning for Monitoring Paddy Crop Growth Analysis
Sathiya Priya.R,Rahamathunnisa.U
#Crop monitoring
#satellite images
#vegetation index
#eigenvector
#eigenvalue
#hybridized clustering algorithm
#ensemble learning
CANBLWO: A Novel Hybrid Approach for Semantic Text Generation
Abhishek Kumar Pandey,Sanjiban Sekhar Roy
#Natural language processing
#natural language generation
#neural network
#convolutional attention network
#whale optimization algorithm
#BERT
#large language model
Prediction of Football Players’ Value in the Transfer Market of Well-known European Leagues based on FIFA 19 and Real-world Data
Yu Sun,Kepeng Gu
#Transfer market
#European football leagues
#data engineering
#variance inflation factor
#regression prediction algorithms
#rhizostoma optimization algorithm
Improvised Software Code Comprehension Using Data Mining
Ram Gopal Gupta,Ankur Dumka,Bireshwar Dass Mazumdar
#Software code comprehension
#code mining
#software maintainability
#association
#classification
#correlation
#coupling
#cohesion
Low Dimensional Multi Class Steganalysis of Spatial LSB based Stego Images Using Textural Features
Veena Sivasamy Thanasekaran,Arivazhagan Selvaraj
#Active steganalysis
#blind steganalysis
#statistical steganalysis
#multi class classifier
#spatial domain algorithms
#ensemble classifier
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Low Dimensional Multi Class Steganalysis of Spatial LSB based Stego Images Using Textural Features
Veena Sivasamy Thanasekaran,Arivazhagan Selvaraj
#Active steganalysis
#blind steganalysis
#statistical steganalysis
#multi class classifier
#spatial domain algorithms
#ensemble classifier
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
1
2
3
4
5
6
7
8
9
10
59
60
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint