ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: key
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Application Analysis of Multi-Task Learning Algorithm in E-Commerce Personalized Advertising Intelligent Push
Min Hou,Mengze Zhang,Yizhou Zhang
#MTL algorithms
#selling point keywords
#sponsored search
#click through rate
#electronic business
#advertisement
#recommended
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
Improved Collaborative Filtering Recommender System Based on Hybrid Similarity Measures
Mohamed Abdi,George Okeyo,Ronald Mwangi
#Recommender systems
#collaborative filtering
#similarity measure
#Adjusted Triangle similarity
#Jaccard similarity
#user rating preference behavior
Empowering Ovarian Cancer Subtype Classification with Parallel Swin Transformers and WSI Imaging
Lubna ALkahla,Jwan Saeed,Maher Hussein
#Ovarian cancer
#Swin-transformer
#sub-type classification
#histology image analysis
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
Bibliometric Analysis and Systematic Review of Research on Expert Finding: A PRISMA-guided Approach
Xuan-Lam Pham,Thi Thu Le
#Expert finding
#expert finding systems
#bibliometric analysis
#systematic review
#PRISMA methodology
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Gesture Recognition Technology of VR Piano Playing Teaching Game based on Hidden Markov Model
Min Zeng
#HMM
#piano performance
#gesture recognition
#SMA
#VR technology
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Embedding Search for Quranic Texts based on Large Language Models
Mohammed Alqarni
#Semantic search
#quranic texts
#large language models
#GPT 3
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Embedding Search for Quranic Texts based on Large Language Models
Mohammed Alqarni
#Semantic search
#quranic texts
#large language models
#GPT 3
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
ERDAP: A Novel Method of Event Relation Data Augmentation Based on Relation Prediction
Ruijuan Hu,Haiyan Liu,Wentao Yu
#Relation prediction
#event relation
#data augmentation
#graph convolutional networks
#causality extraction
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Smart City Application: Internet of Things (IoT) Technologies Based Smart Waste Collection Using Data Mining Approach and Ant Colony Optimization
Zeki Oralhan,Burcu Oralhan,Yavuz Yiğit
#Ant colony optimization
#data mining
#IoT smart device
#smart city
#smart waste management
1
2
3
4
5
6
7
8
9
10
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint