ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: key
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with
AlexNet, Abdulwahab Alazeb, Naif Al Mudawi, Touseef Sadiq, Bayan Alabdullah, Hammed ur Rahman, Asaad Algarni, Ahmad Jalal
#Pattern recognition
# alexNet
# fish swarm algorithm
# object detection
ACLM: Developing a Compact Arabic Language Model
Mohamed Alkaoud,Muteb Alsaqoub,Ibrahim Aljodhi,Abdulrhman Alqadibi,Omar Altammami
#Arabic NLP
#deep learning
#efficient AI
#generative AI
#GPT
#large language models
#natural language generation
#NLP
#small language models
Application Analysis of Multi-Task Learning Algorithm in E-Commerce Personalized Advertising Intelligent Push
Min Hou,Mengze Zhang,Yizhou Zhang
#MTL algorithms
#selling point keywords
#sponsored search
#click through rate
#electronic business
#advertisement
#recommended
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Application Analysis of Multi-Task Learning Algorithm in E-Commerce Personalized Advertising Intelligent Push
Min Hou,Mengze Zhang,Yizhou Zhang
#MTL algorithms
#selling point keywords
#sponsored search
#click through rate
#electronic business
#advertisement
#recommended
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
Improved Collaborative Filtering Recommender System Based on Hybrid Similarity Measures
Mohamed Abdi,George Okeyo,Ronald Mwangi
#Recommender systems
#collaborative filtering
#similarity measure
#Adjusted Triangle similarity
#Jaccard similarity
#user rating preference behavior
Empowering Ovarian Cancer Subtype Classification with Parallel Swin Transformers and WSI Imaging
Lubna ALkahla,Jwan Saeed,Maher Hussein
#Ovarian cancer
#Swin-transformer
#sub-type classification
#histology image analysis
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
Bibliometric Analysis and Systematic Review of Research on Expert Finding: A PRISMA-guided Approach
Xuan-Lam Pham,Thi Thu Le
#Expert finding
#expert finding systems
#bibliometric analysis
#systematic review
#PRISMA methodology
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Gesture Recognition Technology of VR Piano Playing Teaching Game based on Hidden Markov Model
Min Zeng
#HMM
#piano performance
#gesture recognition
#SMA
#VR technology
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Embedding Search for Quranic Texts based on Large Language Models
Mohammed Alqarni
#Semantic search
#quranic texts
#large language models
#GPT 3
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Embedding Search for Quranic Texts based on Large Language Models
Mohammed Alqarni
#Semantic search
#quranic texts
#large language models
#GPT 3
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
1
2
3
4
5
6
7
8
9
10
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint