ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: constraint
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
Disease Prognosis of Fetal Heart’s Four-Chamber and Blood Vessels in Ultrasound Images Using CNN Incorporated VGG 16 and Enhanced DRNN
Someshwaran Gunasekaran,Sarada Vivekasaran
#Fetal heart disease
#ultrasound images
#augmented wiener filter
#median modified wiener filter
#region of interest
#convolutional neural network
#visual geometry group 16
#deep recurrent neural network
Using Deep Learning for Profitable Concrete Forecasting Methods
Ayat Al-Hinawi,Radwan Alelaimat
#Concrete performance prediction
#machine learning
#deep learning
#construction management
#regression
Horizontal Sequence Pooling Technique in Convolutional Neural Networks to Optimize Feature Extraction for DNA Sequence Classification
Lilibeth Coronel,Arnel Fajardo,Ruji Medina
#Pooling technique
#classification
#convolutional neural network
#feature extraction
#genomic sequence
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Linking Palliative Homecare to the Universal Health Coverage Principles and the United Nations Sustainability Development Goals Using the i* Framework’s Strategic and Social Requirements Modelling, Applied to a Cancer Care Organisation
Yousra Odeh,Dina Tbaishat,Faten F. Kharbat,Omar Shamieh,Mohammed Odeh
#Universal health coverage
#UNSDGs
#i* framework
#home health care
#palliative care
#goal-oriented modelling
#social requirements modelling
#cancer care process modelling
#cancer care informatics
#cancer care sociotechnical systems
Generative Adversarial Networks with Data Augmentation and Multiple Penalty Areas for Image Synthesis
Li Chen,Huah Yong Chan
#Generative model
#image synthesis
#data augmentation
Test Case PrioritizationforRegression Testing Using Immune Operator
Abstract:Regressiontesting is a time consuming, costly process of re-running existing test cases.Assoftware evolves, the
#Immuneoperator
# vaccine
# test case prioritization
# regression testing
#GA
#IPA
Patching Assignment Optimization for Security
Department of Information Management, National Taiwan University, Taiwan
#
Unconstraint Assignment Problem: A Molecular Computing Approach Ibrahim Zuwairie1&2, Tsuboi Yusei2, Ono Osamu2, and Khalid Marzuki3
Abstract:Deoxyribonucleic Acid or DNA-based computing is an emerging field that bridging the gap between chemistry,
#DNA computing
# assignment problem
# optimization
Enforcing User-Defined Constraints During the Run-Time in OODB
, Ali Mamat 2
#Object-oriented databases
# integrity constraints
# constraints violation
Scatter Search and Graph Heuristics for the
and Habiba Drias 2
#Examination timetabling
# scatter search
# evolutionary
# meta-heuristic
# graph heuristics
#UML
#OCL
#Petrinets
#temporallogics
#verificatio n
Department of Electronics and Communication Engine ering, PSG College of Technology, India.
# wavelet
#multiwavelet
#SPIHT
#SPECK
Department of Electronics and Communication Enginee ring, PSG College of Technology, India.
# videocompression
#quantization
#prediction
#entrop ycoding
#multiwavelets
#scalingfunctions
# Examscheduling
#graphalgorithms
#graphcoloring
# performanceanalysis
Constraint-Based Sequential Pattern Mining: A Pattern Growth Algorithm Incorporating
Bhawna Mallick1, Deepak Garg1, and Preetam Singh Grover2 1Department of Computer Science and Engineering, Tha par University, India 2Institute of Technology Grater Noida University, India
# Sequential pattern mining
# constraint)based sequent ial pattern mining
# constraint
# prefixspan
# monetary
# compactness
1
2
3
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint