ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: SHO
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Cl
Ghadeer
#Lexicon-based
#classification
#customer
#review
#text analysis
Symmetric Classes of Series-Parallel Digraphs
Ruzayn Quaddoura
#Digraphs
#series-parallel digraphs
#design and analysis of algorithms
#complexity
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Classification
Vivine Nurcahyawati,Zuriani Mustaffa,Mohammed Khalaf
#Lexicon-based
#classification
#customer
#review
#text analysis
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
Application Analysis of Multi-Task Learning Algorithm in E-Commerce Personalized Advertising Intelligent Push
Min Hou,Mengze Zhang,Yizhou Zhang
#MTL algorithms
#selling point keywords
#sponsored search
#click through rate
#electronic business
#advertisement
#recommended
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose and Esophagus Studies
Muhammad Siddiqi,Yousef Alhwaiti,Said Elaiwat,Marwan Abu-Zanona
#Computer vision
#image morphing
#warping
#face matching
#forward algorithm
#backward algorithm
FPGA based Flexible Implementation of Light Weight Inference on Deep Convolutional Neural Networks
Shefa Dawwd
#Standard convolution
#depthwise separable convolution
#inference
#deep convolutional neural networks
#FPGA
Narwhal Optimizer: A Novel Nature-Inspired Metaheuristic Algorithm
Seyyid Ahmed Medjahed,Fatima Boukhatem
#Narwhal optimizer
#meta-heuristic
#optimization
#nature-inspired algorithms
#swarm intelligence
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models
Abdelraouf Ishtaiwi,Ali Ali,Ahmad Al-Qerem,Yazan Alsmadi,Amjad Aldweesh,Mohammad Alauthman,Omar Alzubi,Shadi Nashwan,Awad Ramadan,Musab Al-Zghoul,Someah Alangari
#Data-augmentation
#objects detection
#brain tumor
#yolov7
#computer vision
Detecting Spam Reviews in Arabic by Deep Learning
Eman Aljadani,Fatmah Assiri,Areej Alshutayri
#Spam reviews
#spam reviews detection
#arabic language
#deep learning
#convolutional neural network
#bidirectional long short-term memory
The Strategy of Discriminating False Comments on the Internet by Fusing Probabilistic Topic and Word Vector Models
Fei Long
#Probabilistic topics
#word vectors
#online reviews
#false detection
#CNN
Improvised Software Code Comprehension Using Data Mining
Ram Gopal Gupta,Ankur Dumka,Bireshwar Dass Mazumdar
#Software code comprehension
#code mining
#software maintainability
#association
#classification
#correlation
#coupling
#cohesion
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
An Improved Q-Learning Algorithm Integrated into the Aloha Anti-Collision Protocol for Energy-Efficient RFID Systems
Van-Hoa Le,Duc-Nhat-Quang Nguyen,Viet-Minh-Nhat Vo
#RFID system
#aloha protocol
#anti-collision
#Q-learning
#energy-efficiency
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
1
2
3
4
5
6
7
8
9
10
30
31
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint