ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: graph
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose and Esophagus Studies
Muhammad Siddiqi,Yousef Alhwaiti,Said Elaiwat,Marwan Abu-Zanona
#Computer vision
#image morphing
#warping
#face matching
#forward algorithm
#backward algorithm
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
ERDAP: A Novel Method of Event Relation Data Augmentation Based on Relation Prediction
Ruijuan Hu,Haiyan Liu,Wentao Yu
#Relation prediction
#event relation
#data augmentation
#graph convolutional networks
#causality extraction
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*
Jing Zhang,Guiyan Wei,Yonggong Ren
#Semi-supervised learning
#clustering
#auto-encoder network
#pair-wise
A New (k, n) Secret Image Sharing Scheme (SISS)
Amitava Nag,Sushanta Biswas,Debasree Sarkar,Partha Sarkar
#complete graph
#spanning tree
#Prüfer sequence
#(k
# n) threshold secret image sharing
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
Evolutionary Computing Model for Finding Breast Cancer Masses using Image Enhancement Procedures with Artificial Intelligent Algorithms
Dhivya Samraj,Kuppuchamy Ramasamy,Muralidharan Karuppusamy
#Image enhancement
#breast cancer
#histogram equalization
#particle swarm optimization
#analysis
A Comparative Study of Different Pre-Trained Deep Learning Models and Custom CNN for Pancreatic Tumor Detection
Muhammed Talha Zavalsız,Sleiman Alhajj,Kashfia Sailunaz,Tansel Ozyer,Reda Alhajj
#Deep learning
#medical image
#pancreatic tumor detection
#convolutional neural networks
#pancreatic ductal adenocarcinoma
MIRNA: Adaptive 3D Game to Assist Children's Distance Learning Difficulties; Design and Use
Dheya Mustafa,Intisar Ghazi Mustafa,Samah Zriqat,Qutaibah AlThebyan
#Distance learning
#game engine
#education
#3D graphics
#games for learning
Segmentation of Mammogram Abnormalities Using Ant System based Contour Clustering Algorithm
Sudha Subramanian,Ganesan Rasu Thevar
#Mammogram
#ant colony optimization
#segmentation
#ant clustering
Retina Disorders Classification via OCT Scan: A Comparative Study between Self-Supervised Learning and Transfer Learning
Saeed Shurrab,Yazan Shannak,Rehab Duwairi
#OCT images
#retina disorders
#self-supervised learning
#transfer learning
#resnet34
MAPNEWS: A Framework for Aggregating and Organizing Online News Articles
Jeelani Ahmed,Muqeem Ahmed
#News aggregation
#information retrieval
#clustering
#data aggregation
#web scrapping
Finger Knuckle Print Authentication Using AES
1
#
Adapted Normalized Graph Cut Segmentation with
Singaravelu Prabhu1 and Dharmaraj Tensing2 1Department of Computer Science and Engineering, Kal aivani College of Technology, India 2 School of Civil Engineering, Karunya University, India
#
Privacy-Preserving Data Mining in Homogeneous
Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#
Improvement in Rebalanced CRT RSA Seema Verma and Deepak Garg
saving. This paper concentrates on the performance improvement. Rebalanced RSA is designed to improve the decryption
#
AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print
Department of Electronics and Communication Enginee ring, Kalasalingam University,
#
1
2
3
4
5
6
7
8
9
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint