ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: DA
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Federated Graph Neural Networks for Dynamic IoT Collaboration Optimization in Smart Home Environments
Cheng Zhang,Yuanquan Zhong
#IoT device collaboration
#graph neural network
#federated learning
#graph structure
#smart home
Arab Face Recognition and Identification Based on Ethnicity and Gender Using Machine Learning
Mohammed Abual-Rub,Khalid Nahar,Ammar Almomani,Firas Alzobi
#Ethnicity
#facial recognition
#neural network
#multi-class classification
#machine learning
#facial features
Bidirectional Circular Shift-Based Reversible Steganography Algorithm with Dual Stego-Images
Mujeebudheen Khan Immamuddinkhan,Siva Sankar Kanahasabapathy
#Data hiding
#multiple stego-image
#PSNR
#bi-directional shift
#stego-image
Enhanced Nucleus Segmentation with Sobel Edge Detection and Attention Gate with Modified UNET
Sravanthi Jakkula,Raju Bhukya
#UNET
#nucleus segmentation
#sobel filter
Automated Excavator Activity Diagnosis Via a Topology and Statistical Information Based Classifier
Mushu Wang,YuKui Qin,Tiepeng Bi,Weigang Pan
#Metric learning
#covering algorithm
#topology and statistical information
#excavator activity classify
Sales Forecasting and Consumption Recommendation System of E-commerce Agricultural Products Based on LSTM Model
Jianwei Wu
#LSTM model
#sales forecast of agricultural products
#e-commerce
#personalized recommendation system
HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services
Abdelraouf Ishtaiwi,Ahmad Nabot,Omar Alzubi,Awad Ramadan,Abdulbasit Darem,Asma Alhashmi,Mohammad Alauthman,Amjad Aldweesh
#Hybrid concurrency control
#local validation
#global validation
#edge-cloud
An Effective Online Learning Course Recommendation Using Improved Deep Active Convolutional Neural Network Based Sentiment Analysis and Ranking
Roshan Bhanuse,Sandip Mal
#Text pre-processing
#feature extraction
#feature selection
#optimization
#sentiment analysis
#online learning
#recommendation
MXLPred: A Natural Language Processing Deep Learning Model for ICU Patients’ Data
Daphne Samuel,Mary Anita Rajam
#Deep learning
#ensemble model
#natural language processing
#MIMIC-IV
#regression
#big query
Feature Selection Method Based on Consecutive Forward Selection and Backward Elimination Concepts Using a Weighted Vector
Luai Al-Shalabi
#Feature selection
#forward-backward
#chi-square
#classification
A Robust Multiwavelet-Based Watermarking Scheme for Copyright Protection of Digital Images using Human Visual System
Padmanabhareddy Vundela,Varadarajan Sourirajan
#Digital watermarking
#copyright protection
#HVS
#robust
#discrete wavelet transform
#GHM multiwavelet transform
#canny edge detection algorithm
#hausdorff distance measure
#correlation coefficient
A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques
Jamal Hussain Shah,Muhammad Sharif,Mudassar Raza,Aisha Azeem
#Linear
#non/linear
#PCA
#2DPCA
#2DKPCA
#facial feat ures extraction
#face recognition
#survey
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases
Ayman Mousa,Osama Faragallah,Elsayed Rabaie,Elsayed Nigm
#Database security
#cryptographic algorithms
#datab ase encryption
#Elsayed Rabaie
#Elsayed Nigm
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
An Improved Version of the Visual Digital Signature Scheme
Abdullah Jaafar,Azman Samsudin
#Digital signature
#non&expansion visual cryptograph y
#boolean operation
#visual share
Modeling Fuzzy Data with Fuzzy Data Types in Fuzzy Database and XML Models
Li Yan
#Database models
#fuzzy data
#fuzzy data types
#fuzzy databases
#fuzzy XML
#modeling
The Statistical Quantized Histogram Texture Features Analysis for Image Retrieval Based on Median and Laplacian Filters in the DCT Domain
Fazal Malik,Baharum Baharudin
#CBIR
#median filter
#laplacian filter
#statistical texture features
#quantized histograms
#DCT
Explore the Relationship between House Prices and Crime Rate in the UK Using Machine Learning Techniques
Soudabeh Motevali,Hamzeh Aljawawdeh,Sami Abuezhayeh,Eman Qaddoumi
#Machine learning techniques
#decision trees
#random forest
#house prices
#crime rates
#house price pre-diction
1
2
3
4
5
6
7
8
9
10
40
41
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint