ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: DL
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
An Effective Online Learning Course Recommendation Using Improved Deep Active Convolutional Neural Network Based Sentiment Analysis and Ranking
Roshan Bhanuse,Sandip Mal
#Text pre-processing
#feature extraction
#feature selection
#optimization
#sentiment analysis
#online learning
#recommendation
Feature Selection Method Based on Consecutive Forward Selection and Backward Elimination Concepts Using a Weighted Vector
Luai Al-Shalabi
#Feature selection
#forward-backward
#chi-square
#classification
A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques
Jamal Hussain Shah,Muhammad Sharif,Mudassar Raza,Aisha Azeem
#Linear
#non/linear
#PCA
#2DPCA
#2DKPCA
#facial feat ures extraction
#face recognition
#survey
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal Medical Image Fusion
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Two-Stage Method of Cervical Cancer Detection using Hybrid Classification Methods
Orasa Patsadu,Srisuda Soranunsri,Chananate Arthayukti
#Cervical cancer
#hybrid classification methods
#two stage classification
#machine learning
#healthcare
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Two-Stage Method of Cervical Cancer Detection using Hybrid Classification Methods
Orasa Patsadu,Srisuda Soranunsri,Chananate Arthayukti
#Cervical cancer
#hybrid classification methods
#two stage classification
#machine learning
#healthcare
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
1
2
3
4
5
6
7
8
9
10
11
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint