ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: ENSIT
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Based on Correlation Analysis and K-Means: An Anomaly Detection Algorithm for Seasonal Time-Series Data
Xin Wang,Yingxue Yang,Xueshuang Ding,Yantao Zhao
#Anomaly detection
#seasonal data
#time series
#DBSCAN
#K-means
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Horizontal Sequence Pooling Technique in Convolutional Neural Networks to Optimize Feature Extraction for DNA Sequence Classification
Lilibeth Coronel,Arnel Fajardo,Ruji Medina
#Pooling technique
#classification
#convolutional neural network
#feature extraction
#genomic sequence
Canine Disease Prediction using Multi-Directional Intensity Proportional Pattern with Correlated Textural Neural Network
Ayesha Taranum,Jyoti Metan,Prasad Yogegowda,Chandrashekar Krishnappa
#Data optimization
#pattern extraction in big data
#multi-directional intensity proportional pattern
#similarity measure system
#correlated textural neural network
#test prediction
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
Improvised Software Code Comprehension Using Data Mining
Ram Gopal Gupta,Ankur Dumka,Bireshwar Dass Mazumdar
#Software code comprehension
#code mining
#software maintainability
#association
#classification
#correlation
#coupling
#cohesion
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models
Abdelraouf Ishtaiwi,Ali Ali,Ahmad Al-Qerem,Yazan Alsmadi,Amjad Aldweesh,Mohammad Alauthman,Omar Alzubi,Shadi Nashwan,Awad Ramadan,Musab Al-Zghoul,Someah Alangari
#Data-augmentation
#objects detection
#brain tumor
#yolov7
#computer vision
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Pattern Recognition Using the Concept of Disjoint Matrix of MIMO System
Mezbahul Islam,Rahmina Rubaiat,Imdadul Islam,Mostafizur Rahaman,Mohamed Ruhul Amin
#Uncoupled MIMO links
#eigenvalues
#unitary matrix
#noise and channel matrix
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
Joint Extraction of Organizations and Relations for Emergency Response Plans with Rich Semantic Information Based on Multi-head Attention Mechanism
Tong Liu,Haoyu Liu,Weijian Ni,Mengxiao Si
#Emergency plan
#entity-relation joint extraction
#deep learning
#attention mechanism
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
Optimization and Comparative Analysis of Quarter-Circular Slotted Microstrip Patch Antenna Using Particle Swarm and Fruit Fly Algorithms
Esin Karpat,Fatih Imamoglu
#Microstrip antenna design
#particle swarm optimization
#fruit fly optimization
Retina Disorders Classification via OCT Scan: A Comparative Study between Self-Supervised Learning and Transfer Learning
Saeed Shurrab,Yazan Shannak,Rehab Duwairi
#OCT images
#retina disorders
#self-supervised learning
#transfer learning
#resnet34
A Technique for Burning Area Identification Using IHS Transformation and Image Segmentation
Abstract: In this paper, we have designed and developed a tec hnique for burning area identification using Intensity Hue
#
Qaisar Abbas1, Irene Fondo´n2, and Emre Celebi3 1College of Computer and Information Sciences, Al Im am Mohammad Ibn Saud Islamic University,
#
Developing a Novel Approach for Content Based
#
1
2
3
4
5
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint