ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: BER
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Improving Student Engagement in College Education with Fuzzy Control Algorithm
Yan Chen
#Fuzzy controller
#mamdani fuzzy inference system
#adaptive control
#modified salp swarm
#engagement level
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Bidirectional Circular Shift-Based Reversible Steganography Algorithm with Dual Stego-Images
Mujeebudheen Khan Immamuddinkhan,Siva Sankar Kanahasabapathy
#Data hiding
#multiple stego-image
#PSNR
#bi-directional shift
#stego-image
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Hybrid FuzzyPCA-VGG16 Framework for Classifying Pox Virus Images
K.P. Haripriya,H. Hannah Inbarani
#Classification
#VGG-16
#PCA
#fuzzy membership function
#CNN
#resnet50
#data augmentation
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Hybrid FuzzyPCA-VGG16 Framework for Classifying Pox Virus Images
K.P. Haripriya,H. Hannah Inbarani
#Classification
#VGG-16
#PCA
#fuzzy membership function
#CNN
#resnet50
#data augmentation
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Classification
Vivine Nurcahyawati,Zuriani Mustaffa,Mohammed Khalaf
#Lexicon-based
#classification
#customer
#review
#text analysis
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
1
2
3
4
5
6
7
8
9
10
16
17
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint