ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: factors
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
Unmanned Target Vehicle Navigation and Path Planning Using Improved Ant Colony Optimization Algorithm Combined with GPS/BDS
Rongli Cai
#Ant colony
#BDS
#GPS
#path planning
#unmanned target vehicle
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Survival Prediction of Children after Bone Marrow Transplant Using Machine Learning Algorithms
Hussam Alawneh,Ahmad Hasasneh
#Bone marrow transplant
#hematopoietic stem cell
#random forest
#bagging
#adaboost
#gradient boost
#decision tree
#XGBoost
Heart Disease Diagnosis Using Decision Trees with Feature Selection Method
Alaa Sheta,Walaa El-Ashmawi,Abdelkarim Baareh
#Machine learning
#classification
#decision tree
#heart disease
#diagnosis
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN
Reshma Vengaloor,Roopa Muralidhar
#Classification
#defect detection
#deep learning
#FRN structure
#yolov5
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
Effects of Using Arabic Web Pages in Building Rank Estimation Algorithm for Google Search Engine Results Page
Mohamed Almadhoun,Nurul Malim
#Web data mining
#search engine optimization
#search engine results pages
#rank estimation
#scrap search engine
#machine learning
#digital marketing
Application of Intelligent Adaptive Neuro Fuzzy Method for Reusability of Component Based Software System
Jyoti Agarwal,Manoj Kumar,Mugdha Sharma,Deepak Verma,Richa Sharma
#Component
#reusability
#software
#fuzzy
#ANFIS
#interface complexity
#understandability
#customizability
#reliability
Digital Forensics Techniques and Trends: A Review
Himanshu Dubey,Shobha Bhatt,Lokesh Negi
#Digital forensics
#digital evidence
#digital investigation model
#digital forensic tool
Encryption Quality Measurement of a Proposed
#
Receivers Using Network Processor IXP 2400
# Buffer utilization
# network processor
# play out buf fer
# play back time
# video streaming Received February 6
# 2007; accepted November 6
# 200 8 1
# Technology acceptance
# factor analysis
# Internet b anking
# Arabic instrument
# UTAUT
FacultyofEngineering,FayoumUniversity,Egypt
#Overlay
# ANN
# pavement design
# neural network
# mech anistic-empirical
# flexible pavements
2009
Mohamed Ben Messaoud, Besma Khelil, and Abdennaceur Kachouri
#ECG
# P wave detection
# correlation
# regression
# diagnosis
Image Quality Assessment Employing RMS
Abstract: This paper presents a new approach for evaluating image quality. The method is based on the histogram similarity
#Image quality measures
# RMS contrast
# histogram similarity
# SSIM
# HIQ
# minkowski distance metric
A new Model of Multi-Key Generation for RFID Access Control System
handling modern security threats, with access decisions influenced by several factors, including situational, environmental
#Encryption key generation model
# Risk-based access control
# Radio frequency identification
Dynamic Random Forest for the Recognition of Arabic Handwritten Mathematical Symbols with A
Laboratory of Advanced Technology and Intelligent Systems, University of Sousse, Tunisia
#Arabic handwritten mathematical symbols recognition
# SH
# HOG
# CCH
# dynamic RF
1
2
3
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint