ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: ENSIT
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with AlexNet
Muhammad Waqas Ahmed,Abdulwahab Alazeb,Naif Al Mudawi,Touseef Sadiq,Bayan Alabdullah,Hameed ur Rahman,Asaad Algarni,Ahmad Jalal
#Pattern recognition
#alexNet
#fish swarm algorithm
#object detection
A Dual-End Recommendation Algorithm Integrating User Intent and Knowledge-Aware Attention Networks
Zijie Ji,Teng Lv,Yi Yu
#Recommendation model
#user intent
#knowledge-aware attention
#dual-end recommendation
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with
AlexNet, Abdulwahab Alazeb, Naif Al Mudawi, Touseef Sadiq, Bayan Alabdullah, Hameed ur Rahman, Asaad Algarni, Ahmad Jalal
#Pattern recognition
# alexNet
# fish swarm algorithm
# object detection
A Dual-End Recommendation Algorithm Integrating User Intent and Knowledge-Aware Attention Networks
Zijie Ji,Teng Lv,Yi Yu
#Recommendation model
#user intent
#knowledge-aware attention
#dual-end recommendation
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models
Abdelraouf Ishtaiwi,Ali Ali,Ahmad Al-Qerem,Yazan Alsmadi,Amjad Aldweesh,Mohammad Alauthman,Omar Alzubi,Shadi Nashwan,Awad Ramadan,Musab Al-Zghoul,Someah Alangari
#Data-augmentation
#objects detection
#brain tumor
#yolov7
#computer vision
Improvised Software Code Comprehension Using Data Mining
Ram Gopal Gupta,Ankur Dumka,Bireshwar Dass Mazumdar
#Software code comprehension
#code mining
#software maintainability
#association
#classification
#correlation
#coupling
#cohesion
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
Speech-Based Techniques for Emotion Detection in Natural Arabic Audio Files
Ashraf Kaloub,Eltyeb Abed Elgabar
#Emotion detection
#natural language processing
#machine learning
#Arabic language
#acoustic features
Based on Correlation Analysis and K-Means: An Anomaly Detection Algorithm for Seasonal Time-Series Data
Xin Wang,Yingxue Yang,Xueshuang Ding,Yantao Zhao
#Anomaly detection
#seasonal data
#time series
#DBSCAN
#K-means
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Horizontal Sequence Pooling Technique in Convolutional Neural Networks to Optimize Feature Extraction for DNA Sequence Classification
Lilibeth Coronel,Arnel Fajardo,Ruji Medina
#Pooling technique
#classification
#convolutional neural network
#feature extraction
#genomic sequence
Canine Disease Prediction using Multi-Directional Intensity Proportional Pattern with Correlated Textural Neural Network
Ayesha Taranum,Jyoti Metan,Prasad Yogegowda,Chandrashekar Krishnappa
#Data optimization
#pattern extraction in big data
#multi-directional intensity proportional pattern
#similarity measure system
#correlated textural neural network
#test prediction
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
1
2
3
4
5
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint