ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: application
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Innovative Approach for Brain Tumor Image Classification with Novel Optimized Feedforward Networks
Raafat Munshi
#Brain tumor image classification
#AMFO-FNN
#gaussian filter
#GLCM
#medical imaging
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera Video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Unsupervised Convolutional Autoencoder Framework for Multimodal Medical Image Fusion in Brain Tumour Diagnosis
Saravanan Vijayan,Malarvizhi Subramani
#Unsupervised learning
#autoencoders
#image fusion
#medical images
#brain tumours
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Unsupervised Convolutional Autoencoder Framework for Multimodal Medical Image Fusion in Brain Tumour Diagnosis
Saravanan Vijayan,Malarvizhi Subramani
#Unsupervised learning
#autoencoders
#image fusion
#medical images
#brain tumours
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Improving Student Engagement in College Education with Fuzzy Control Algorithm
Yan Chen
#Fuzzy controller
#mamdani fuzzy inference system
#adaptive control
#modified salp swarm
#engagement level
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services
Abdelraouf Ishtaiwi,Ahmad Nabot,Omar Alzubi,Awad Ramadan,Abdulbasit Darem,Asma Alhashmi,Mohammad Alauthman,Amjad Aldweesh
#Hybrid concurrency control
#local validation
#global validation
#edge-cloud
Arabic Language Characteristics that Make its Automatic Processing Challenging
Ilhem Boulesnam,Rabah Boucetti
#Computational linguistics
#natural language processing
#Arabic natural language processing
#Arabic characteristics
#Arabic language automation
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases
Ayman Mousa,Osama Faragallah,Elsayed Rabaie,Elsayed Nigm
#Database security
#cryptographic algorithms
#datab ase encryption
#Elsayed Rabaie
#Elsayed Nigm
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with AlexNet
Muhammad Waqas Ahmed,Abdulwahab Alazeb,Naif Al Mudawi,Touseef Sadiq,Bayan Alabdullah,Hameed ur Rahman,Asaad Algarni,Ahmad Jalal
#Pattern recognition
#alexNet
#fish swarm algorithm
#object detection
Facial Expression Recognition and Classification Using Optimized EfficientNet-B7
Jenu Prabha,Vinod Kumar
#Facial expression
#recognition
#optimization
#efficientnet
#feature extraction
#deep learning
Power Inspection Robot Dog Inspection Line Planning and Autonomous Navigation Strategy
Bingye Zhang,Minjie Zhu,Haibo Li,Hongliang Zou,Xueyan Wang
#Power inspection
#a robot dog
#improved ant colony algorithm
#improved dynamic window method
#global path planning
#local path planning
ACLM: Developing a Compact Arabic Language Model
Mohamed Alkaoud,Muteb Alsaqoub,Ibrahim Aljodhi,Abdulrhman Alqadibi,Omar Altammami
#Arabic NLP
#deep learning
#efficient AI
#generative AI
#GPT
#large language models
#natural language generation
#NLP
#small language models
1
2
3
4
5
6
7
8
9
10
17
18
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint