ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: its
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Empowering Ovarian Cancer Subtype Classification with Parallel Swin Transformers and WSI Imaging
Lubna ALkahla,Jwan Saeed,Maher Hussein
#Ovarian cancer
#Swin-transformer
#sub-type classification
#histology image analysis
Cyberbullying Detection in Social Networks Using Deep Learning
Hayel Khafajeh
#Cyberbullying detection
#deep learning
#social networks
#convolutional neural networks
#long short-term memory
#bidirectional encoder representations from transformers
Tamil Lang TSP: Tamil Lang Transformer Neural Text to Sign Production
Thillai Sivakavi S,Minu R I
#Sign language production
#Roberta morpho syntactic analysis
#sign language production network
Semi-Supervised Kernel Discriminative Low-Rank Ridge Regression for Data Classification
Qi Zhu,Yong Peng
#Discriminative subspace
#low-rank regression
#kernel space
#ridge regression
#semi-supervised classification
Using Deep Learning for Profitable Concrete Forecasting Methods
Ayat Al-Hinawi,Radwan Alelaimat
#Concrete performance prediction
#machine learning
#deep learning
#construction management
#regression
Horizontal Sequence Pooling Technique in Convolutional Neural Networks to Optimize Feature Extraction for DNA Sequence Classification
Lilibeth Coronel,Arnel Fajardo,Ruji Medina
#Pooling technique
#classification
#convolutional neural network
#feature extraction
#genomic sequence
Evaluation of Emission Reduction Performance of Power Enterprises Based on Least Squares Support Vector Machine
Wanqing Zhang,Ruohan Huang,Luwei Ye
#Power generation enterprise
#evaluation indicators
#least squares support vector machine
#Lion swarm optimization algorithm
#chaos theory
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
Image Object and Scene Recognition Based on Improved Convolutional Neural Network
Guoyan Li,Fei Wang
#Object recognition
#deep learning
#scene recognition
#convolutional neural network
#sliding window fusion
An Improved Classification Model for English Syntax Error Correction Design of DL Algorithm
Xue Han
#Universities
#English
#syntax error
#classification model
#neural network
#attention mechanism
A Novel Adaptive ANC Algorithm for Removal of Background Noise in Speech Applications
Vinothkumar.G,Manoj Kumar.D
#ANC
#FxNLMS
#NIHL
#speech enhancement
#background noise cancellation
#MSE
#SNRi
#PESQ and STOI
A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
Laid Kenioua,Brahim Lejdel,Mohamed Abdelhamid Nedioui
#Autonomous vehicles
#positioning security
#secure communication
#semi-decentralized collaboration architecture
#edge computing
#data collection
#consensus
CANBLWO: A Novel Hybrid Approach for Semantic Text Generation
Abhishek Kumar Pandey,Sanjiban Sekhar Roy
#Natural language processing
#natural language generation
#neural network
#convolutional attention network
#whale optimization algorithm
#BERT
#large language model
From Neutrosophic Soft Set to Effective Neutrosophic Soft Set Generalizations and Applications
Sumyyah Al-Hijjawi,Abd Ghafur Ahmad,Shawkat Alkhazaleh
#Soft set
#neutrosophic soft set
#effective set
#effective fuzzy soft set
#effective neutrosophic soft set
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose and Esophagus Studies
Muhammad Siddiqi,Yousef Alhwaiti,Said Elaiwat,Marwan Abu-Zanona
#Computer vision
#image morphing
#warping
#face matching
#forward algorithm
#backward algorithm
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
FPGA based Flexible Implementation of Light Weight Inference on Deep Convolutional Neural Networks
Shefa Dawwd
#Standard convolution
#depthwise separable convolution
#inference
#deep convolutional neural networks
#FPGA
Ar-CM-ViMETA: Arabic Image Captioning based on Concept Model and Vision-based Multi-Encoder Transformer Architecture
Asmaa Osman,Mohamed Shalaby,Mona Soliman,Khaled Elsayed
#Arabic image captioning
#transformer
#concept
#computer vision
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
1
2
3
4
5
6
7
8
9
10
19
20
ยป
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint