ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: ILA
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Canine Disease Prediction using Multi-Directional Intensity Proportional Pattern with Correlated Textural Neural Network
Ayesha Taranum,Jyoti Metan,Prasad Yogegowda,Chandrashekar Krishnappa
#Data optimization
#pattern extraction in big data
#multi-directional intensity proportional pattern
#similarity measure system
#correlated textural neural network
#test prediction
An Improved Classification Model for English Syntax Error Correction Design of DL Algorithm
Xue Han
#Universities
#English
#syntax error
#classification model
#neural network
#attention mechanism
A Novel Adaptive ANC Algorithm for Removal of Background Noise in Speech Applications
Vinothkumar.G,Manoj Kumar.D
#ANC
#FxNLMS
#NIHL
#speech enhancement
#background noise cancellation
#MSE
#SNRi
#PESQ and STOI
Analyzing Sentiments using Optimized Novel Ensemble Fuzzy and DL based Approach with Efficient Feature Selection and Extraction Models
Potu Bharath,Dasari Venkata Lakshmi
#Sentiment analysis
#deep convolutional fuzzy neural network
#multilayer stacked bidirectional LSTM neural network inception-ResNet-V2
#enhanced reptile search algorithm
#Al-Biruni earth radius optimization algorithm
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction
Nur Aliah Syahmina Mohd Nazarudin,Nor Hapiza Mohd Ariffin,Ruhaila Maskat
#Stock price prediction
#machine learning
#synthetic data generation
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
Survival Prediction of Children after Bone Marrow Transplant Using Machine Learning Algorithms
Hussam Alawneh,Ahmad Hasasneh
#Bone marrow transplant
#hematopoietic stem cell
#random forest
#bagging
#adaboost
#gradient boost
#decision tree
#XGBoost
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahouat,Manar Abourezq,Najima Daoudi
#ANLP
#feature extraction
#word embedding
#BERT
#transformers
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahouat,Manar Abourezq,Najima Daoudi
#ANLP
#feature extraction
#word embedding
#BERT
#transformers
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*
Jing Zhang,Guiyan Wei,Yonggong Ren
#Semi-supervised learning
#clustering
#auto-encoder network
#pair-wise
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Design and Implementation of a Diacritic Arabic Text-To-Speech System
Aissa Amrouche,Leila Falek,Hocine Teffahi
#Diacritics
#Arabic Language
#Diacritization
#Text-To-Speech
#Speech synthesis
#Unit selection
#Bi-grams model
An Efficient Perceptual of CBIR System using MIL-SVM Classification and SURF Feature Extraction
Bhuvana Shanmugam,Radhakrishnan Rathinavel,Tamije Perumal,Subhakala Subbaiyan
#SURF
#MIL-SVM
#LBG
#HI
An Effective Management Model for Data Caching in MANET Environment
Amer Abu Salem
#MANET
#NS3
#admission control
#replacement strategy
#consistency strategy
Induction of Co-existing Items Available in Distributed Version Control Systems for Software Development
Sibel Özyer
#Version control systems
#requirement analysis
#co-occurrence analysis
#natural language processing
1
2
3
4
5
6
7
8
9
10
13
14
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint