ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: SW
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with AlexNet
Muhammad Waqas Ahmed,Abdulwahab Alazeb,Naif Al Mudawi,Touseef Sadiq,Bayan Alabdullah,Hameed ur Rahman,Asaad Algarni,Ahmad Jalal
#Pattern recognition
#alexNet
#fish swarm algorithm
#object detection
Modularization in Dual System and Occupational Self-governance Concerns Employing the Fuzzy Control Algorithm in Vocational Education Personnel Training
Jinyuan Li,Yuqi Cheng
#Fuzzy control
#modularization
#personnel training
#vocational education
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with
AlexNet, Abdulwahab Alazeb, Naif Al Mudawi, Touseef Sadiq, Bayan Alabdullah, Hameed ur Rahman, Asaad Algarni, Ahmad Jalal
#Pattern recognition
# alexNet
# fish swarm algorithm
# object detection
Modularization in Dual System and Occupational Self-governance Concerns Employing the Fuzzy Control Algorithm in Vocational Education Personnel Training
Jinyuan Li,Yuqi Cheng
#Fuzzy control
#modularization
#personnel training
#vocational education
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Integrating Multiplex Heterogeneous Network for Knowledge Tracing
Liqing Qiu,Si’ao Sun
#Knowledge tracing
#multiplex heterogeneous networks
#graph representation learning
#pre-trained embeddings
#graph convolutional networks
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Leveraging Chicken Swarm Algorithm for Feature Selection Optimization Targeting Efficient Patients Backlog Elimination
Emna Bouazizi,Ayman E. Khedr,Amira M. Idrees
#Optimization
#chicken swarm optimization algorithm
#feature selection
#logistics
#supply chain management
#backlogs
A Proposed Genetic Algorithm Adaptation Based Model for Students’ Tracks Prediction
Mourad Kaddes,Ayman E. Khedr,Amira M. Idrees
#Genetic algorithms
#optimization
#particle swarm optimization
#education
#student tracks
Integrating Multiplex Heterogeneous Network for Knowledge Tracing
Liqing Qiu,Si’ao Sun
#Knowledge tracing
#multiplex heterogeneous networks
#graph representation learning
#pre-trained embeddings
#graph convolutional networks
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Leveraging Chicken Swarm Algorithm for Feature Selection Optimization Targeting Efficient Patients Backlog Elimination
Emna Bouazizi,Ayman E. Khedr,Amira M. Idrees
#Optimization
#chicken swarm optimization algorithm
#feature selection
#logistics
#supply chain management
#backlogs
Narwhal Optimizer: A Novel Nature-Inspired Metaheuristic Algorithm
Seyyid Ahmed Medjahed,Fatima Boukhatem
#Narwhal optimizer
#meta-heuristic
#optimization
#nature-inspired algorithms
#swarm intelligence
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
Insights into Automated Attractiveness Evaluation from 2D Facial Images: A Comprehensive Review
Ali Ibrahem,Jwan Saeed,Adnan Abdulazeez
#Facial beauty prediction
#facial attractiveness assessment
#beauty hypotheses
#beauty computation model
Application of Video Game Algorithm Based on Deep Q-Network Learning in Music Rhythm Teaching
Shilian Zhang,Zheng Huang,Yalin Lang
#DQN network learning
#video game algorithms
#the rhythm of music
#teaching practice
Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Mohammad Alia,Adnan Hnaif,Aseel Alrawashdeh,Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Ahmad AlShanty
#Particle swarm optimization
#discrete wavelet transform
#discrete cosine transform
#denosing network
#additive white gaussian noise
#peak signal-to-noise ratio
#normalized correlation coefficient
Empowering Ovarian Cancer Subtype Classification with Parallel Swin Transformers and WSI Imaging
Lubna ALkahla,Jwan Saeed,Maher Hussein
#Ovarian cancer
#Swin-transformer
#sub-type classification
#histology image analysis
1
2
3
4
5
6
7
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint