ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: efficient
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal Medical Image Fusion
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
Facial Expression Recognition and Classification Using Optimized EfficientNet-B7
Jenu Prabha,Vinod Kumar
#Facial expression
#recognition
#optimization
#efficientnet
#feature extraction
#deep learning
ACLM: Developing a Compact Arabic Language Model
Mohamed Alkaoud,Muteb Alsaqoub,Ibrahim Aljodhi,Abdulrhman Alqadibi,Omar Altammami
#Arabic NLP
#deep learning
#efficient AI
#generative AI
#GPT
#large language models
#natural language generation
#NLP
#small language models
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
Facial Expression Recognition and Classification Using Optimized EfficientNet-B7
Jenu Prabha,Vinod Kumar
#Facial expression
#recognition
#optimization
#efficientnet
#feature extraction
#deep learning
ACLM: Developing a Compact Arabic Language Model
Mohamed Alkaoud,Muteb Alsaqoub,Ibrahim Aljodhi,Abdulrhman Alqadibi,Omar Altammami
#Arabic NLP
#deep learning
#efficient AI
#generative AI
#GPT
#large language models
#natural language generation
#NLP
#small language models
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Leveraging Chicken Swarm Algorithm for Feature Selection Optimization Targeting Efficient Patients Backlog Elimination
Emna Bouazizi,Ayman E. Khedr,Amira M. Idrees
#Optimization
#chicken swarm optimization algorithm
#feature selection
#logistics
#supply chain management
#backlogs
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Leveraging Chicken Swarm Algorithm for Feature Selection Optimization Targeting Efficient Patients Backlog Elimination
Emna Bouazizi,Ayman E. Khedr,Amira M. Idrees
#Optimization
#chicken swarm optimization algorithm
#feature selection
#logistics
#supply chain management
#backlogs
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Hierarchical Method for Automated Text Documents Classification
Mohamed H. Mousa,Ayman E. Khedr,Amira M. Idrees
#Classification
#knowledge discovery
#text mining
#feature selection
#TF-IDF
#natural language processing
#hierarchical based
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
An Improved Q-Learning Algorithm Integrated into the Aloha Anti-Collision Protocol for Energy-Efficient RFID Systems
Van-Hoa Le,Duc-Nhat-Quang Nguyen,Viet-Minh-Nhat Vo
#RFID system
#aloha protocol
#anti-collision
#Q-learning
#energy-efficiency
1
2
3
4
5
6
7
8
9
10
16
17
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint