ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: local
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
FPGA based Flexible Implementation of Light Weight Inference on Deep Convolutional Neural Networks
Shefa Dawwd
#Standard convolution
#depthwise separable convolution
#inference
#deep convolutional neural networks
#FPGA
Narwhal Optimizer: A Novel Nature-Inspired Metaheuristic Algorithm
Seyyid Ahmed Medjahed,Fatima Boukhatem
#Narwhal optimizer
#meta-heuristic
#optimization
#nature-inspired algorithms
#swarm intelligence
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
Based on Correlation Analysis and K-Means: An Anomaly Detection Algorithm for Seasonal Time-Series Data
Xin Wang,Yingxue Yang,Xueshuang Ding,Yantao Zhao
#Anomaly detection
#seasonal data
#time series
#DBSCAN
#K-means
Disease Prognosis of Fetal Heart’s Four-Chamber and Blood Vessels in Ultrasound Images Using CNN Incorporated VGG 16 and Enhanced DRNN
Someshwaran Gunasekaran,Sarada Vivekasaran
#Fetal heart disease
#ultrasound images
#augmented wiener filter
#median modified wiener filter
#region of interest
#convolutional neural network
#visual geometry group 16
#deep recurrent neural network
A New Facial Expression Recognition Algorithm Based on DWT Feature Extraction and Selection
Fatima Zohra BOUKHOBZA,Abdenour HACINE GHARBI,Khaled ROUABAH
#Facial expression recognition
#2D-DWT
#person-independent system
#feature extraction
#wrapper feature selection
#dimensionality reduction
Gesture Recognition Technology of VR Piano Playing Teaching Game based on Hidden Markov Model
Min Zeng
#HMM
#piano performance
#gesture recognition
#SMA
#VR technology
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Medical Image Registration and Fusion Using Principal Component Analysis
Meisen Pan,Jianjun Jiang,Fen Zhang,Qiusheng Rong
#Centroids
#image registration
#principal component analysis
#image fusion
An Effective Management Model for Data Caching in MANET Environment
Amer Abu Salem
#MANET
#NS3
#admission control
#replacement strategy
#consistency strategy
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
Hybrid Feature Selection based on BTLBO and RNCA to Diagnose the Breast Cancer
Mohan Allam,Nandhini Malaiyappan
#Hybrid feature selection
#binary teaching learning based optimization
#neighborhood component analysis
Performance Comparison of Multiple ANN Optimizer on IoT-enabled Sensor Fire Dataset
Sudip Suklabaidya,Indrani Das
#Sensor dataset
#fire detection
#ANN
#SGD
#adam
#adamax
A Novel Codebook Generation by Smart Fruit Fly Algorithm based on Exponential Flight
Ilker Kilic
#Metaheuristic optimization technique
#fruit fly algorithm
#image compression
#codebook generation
IoT Based Technique for Network Packet Analyzer
Nouh Alhindawi
#Internet of things
#packet analyzers
#networks monitoring
#cloud processing
Modified Cuckoo Search Algorithm for Motion Vector Estimation
Suvojit Acharjee,Sheli Sinha Chaudhuri
#Block matching algorithm
#motion estimation
#cuckoo search
#video compression
#metaheuristic
Developing a Novel Approach for Content Based
#
Privacy-Preserving Data Mining in Homogeneous
Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#
A Vision Approach for Expiry Date Recognition using Stretched Gabor Features
Abstract: Product"expiry date represent important information for products consumption. They must contain clear
#
1
2
3
4
5
6
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint