ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: ARMA
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Image Compression based on Iteration-Free Fractal and using Fuzzy Clustering on DCT Coefficients
Sobia Mahalingam,Valarmathi Lakshapalam,Saranya Ekabaram
#Fractal image compression
#fuzzy clustering
#DCT coefficients
#contractive affine transformation
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Application of Intelligent Adaptive Neuro Fuzzy Method for Reusability of Component Based Software System
Jyoti Agarwal,Manoj Kumar,Mugdha Sharma,Deepak Verma,Richa Sharma
#Component
#reusability
#software
#fuzzy
#ANFIS
#interface complexity
#understandability
#customizability
#reliability
A Comparative Study on Deep Learning and Machine Learning Models for Human Action Recognition in Aerial Videos
Surbhi Kapoor,Akashdeep Sharma,Amandeep Verma,Vishal Dhull,Chahat Goyal
#Human action recognition
#openpose
#unmanned aerial vehicle
#kNN
#decision trees
#random forests
#SVM
#multilayer perceptron
#LSTM
Adapted Normalized Graph Cut Segmentation with
Singaravelu Prabhu1 and Dharmaraj Tensing2 1Department of Computer Science and Engineering, Kal aivani College of Technology, India 2 School of Civil Engineering, Karunya University, India
#
# Chaotic optimization
# GA
# CGA
# SVR
# volatility
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share
#Phishing
# two-factor authentication
# web security
# google cloud messaging
# mobile authentication
A Hybrid Approach for Modeling Financial Time Series
Faculty of Mathematics and Computer Science, Ovidi us University from Constanta, Romania
# Financial time series
# forecasting
# ARMA
# GEP
# hybr id methodology
Tunisian Arabic Chat Alphabet Transliteration Using Probabilistic Finite State Transducers
Nadia Karmani, Hsan Soussou, and Adel Alimi
#Tunisian arabic chat alphabet
# tunisian arabic
# transliteration
# aebWordNet
# tunisian arabic morphological analyzer
# weighted finite state transducer
A New Metric for Class Cohesion for Object Oriented Software
Anjana Gosain1 and Ganga Sharma2
#Class cohesion
# metrics
# OO software
# maintenance-effort
# metric validation
A Daubechies DWT Based Image Steganography Using Smoothing Operation
Vijay Sharma, Devesh Srivastava, and Pratistha Mathur
#Steganography
# Daubechies DWT
# Arnold transform
# smoothing operation
# genetic algorithm
# morphological operation
Generating Sequence Diagrams from Arabic User Requirements using MADA+TOKAN Tool
Nermeen Alami, Nabil Arman, and Faisal Khamayseh
#UML
# automated software engineering
# sequence diagram
# Arabic user requirements
Headnote Prediction Using Machine Learning Sarmad Mahar1, Sahar Zafar2, and Kamran Nishat1 1CoCIS, PAF-Karachi Institute of Economics and Technology, Pakistan 2Computer Science, Sindh Madressatul Islam University, Pakistan
Abstract: Headnotes are the precise explanation and summary of legal points in an issued judgment. Law journals hire
#Judgment summary
# head-note prediction
# machine learning
# text summarization
An Ensemble-based Supervised Machine Learning Framework for Android Ransomware Detection
Shweta Sharma1, Rama Krishna Challa1, and Rakesh Kumar2
#Smartphone security
# android
# ensemble learning
# ransomware
# and dimensionality reduction
A Novel Architecture for Search Engine using Domain Based Web Log Data
Prem Sharma,Divakar Yadav
#Search engine
#information retrieval
#web usage mining
#content mining
Multi-Pose Facial Expression Recognition Using Hybrid Deep Learning Model with Improved Variant of Gravitational Search Algorithm
Yogesh Kumar,Shashi Kant Verma,Sandeep Sharma
#Deep learning
#emotion recognition
#quantum computing
#swarm intelligence
#convolutional neural networks
#recurrent neural networks
An Efficient Algorithm for the Generalized Partially Instantiated Same Generation Query in Deductive Databases
Nabil Arman
#Deductive databases
#linear recursive rules
#same generation query
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint