ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: SH
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
Ecological Capacity Assessment of Forest Park Tourists by Integrating Attention Mechanisms and Remote Sensing Images
Qiaofeng Zhou
#Attention mechanisms
#remote sensing imagery
#tourist
#ecological capacity
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
Ecological Capacity Assessment of Forest Park Tourists by Integrating Attention Mechanisms and Remote Sensing Images
Qiaofeng Zhou
#Attention mechanisms
#remote sensing imagery
#tourist
#ecological capacity
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Improving Student Engagement in College Education with Fuzzy Control Algorithm
Yan Chen
#Fuzzy controller
#mamdani fuzzy inference system
#adaptive control
#modified salp swarm
#engagement level
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Federated Graph Neural Networks for Dynamic IoT Collaboration Optimization in Smart Home Environments
Cheng Zhang,Yuanquan Zhong
#IoT device collaboration
#graph neural network
#federated learning
#graph structure
#smart home
1
2
3
4
5
6
7
8
9
10
49
50
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint