ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: power
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
A Proposed Genetic Algorithm Adaptation Based Model for Students’ Tracks Prediction
Mourad Kaddes,Ayman E. Khedr,Amira M. Idrees
#Genetic algorithms
#optimization
#particle swarm optimization
#education
#student tracks
Investigation of Chat GPT’s Impact on Education Using Deep Spectral-Spatial Residual Attention Networks
Walaa Ismail,Howida Youssry
#Chat generative pre-trained transformer
#continuous-discrete derivative-free extended Kalman filter
#deep spectral-spatial residual attention network
#parrot optimization algorithm
#synchro-transient- extraction transform
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
Empowering Ovarian Cancer Subtype Classification with Parallel Swin Transformers and WSI Imaging
Lubna ALkahla,Jwan Saeed,Maher Hussein
#Ovarian cancer
#Swin-transformer
#sub-type classification
#histology image analysis
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Evaluation of Emission Reduction Performance of Power Enterprises Based on Least Squares Support Vector Machine
Wanqing Zhang,Ruohan Huang,Luwei Ye
#Power generation enterprise
#evaluation indicators
#least squares support vector machine
#Lion swarm optimization algorithm
#chaos theory
RSO based Optimization of Random Forest Classifier for Fault Detection and Classification in Photovoltaic Arrays
Khaled Baradieh,Mohd Zainuri,Mohamed Kamari,Yushaizad Yusof,Huda Abdullah,Mohd Zaman,Mohd Zulkifley
#Classifier
#diagnosis
#fault classification
#fault detection
#machine learning
#optimization
#photovoltaic
#pv
#random forest
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahouat,Manar Abourezq,Najima Daoudi
#ANLP
#feature extraction
#word embedding
#BERT
#transformers
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahouat,Manar Abourezq,Najima Daoudi
#ANLP
#feature extraction
#word embedding
#BERT
#transformers
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Classification of Breast Cancer using Ensemble Filter Feature Selection with Triplet Attention Based Efficient Net Classifier
Bangalore Nagaraj Madhukar,Shivanandamurthy Hiremath Bharathi,Matta Polnaya Ashwin
#Breast cancer classification
#histopathology image
#ensemble filter feature selection
#triplet attention based EfficientNet
#TAENet
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*
Jing Zhang,Guiyan Wei,Yonggong Ren
#Semi-supervised learning
#clustering
#auto-encoder network
#pair-wise
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
A Novel Codebook Generation by Smart Fruit Fly Algorithm based on Exponential Flight
Ilker Kilic
#Metaheuristic optimization technique
#fruit fly algorithm
#image compression
#codebook generation
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
1
2
3
4
5
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint