ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: probability
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Analytical Model of Many-Core System Using N-Conjugate Shuffle Cluster (NCSC)
Mahmoud Obaid,Allam Abumwais,Suhail Odeh,Mahmoud Aldababsa,Rami Hodrob
#Many-core
#interconnection network
#n-conjugate shuffle
#content addressable memory
#scalability
#reliability
Automatic Pronunciation Calibration Method of Language Resource Base Based on Dynamic Time Rounding Algorithm
Shao Gong,Heng Xiao
#Dynamic time rounding
#voice interaction
#semantics
#language resource library
#pronunciation
#detection model
An Improved Version of the Visual Digital Signature Scheme
Abdullah Jaafar,Azman Samsudin
#Digital signature
#non&expansion visual cryptograph y
#boolean operation
#visual share
Integrating Multiplex Heterogeneous Network for Knowledge Tracing
Liqing Qiu,Si’ao Sun
#Knowledge tracing
#multiplex heterogeneous networks
#graph representation learning
#pre-trained embeddings
#graph convolutional networks
Integrating Multiplex Heterogeneous Network for Knowledge Tracing
Liqing Qiu,Si’ao Sun
#Knowledge tracing
#multiplex heterogeneous networks
#graph representation learning
#pre-trained embeddings
#graph convolutional networks
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
Sri Venkateswara College of Engineering, India
#Image encryption
# modular addition
# chaotic maps
# l ogistic map
# socek
# grp
# cross
# block cipher
Test Case PrioritizationforRegression Testing Using Immune Operator
Abstract:Regressiontesting is a time consuming, costly process of re-running existing test cases.Assoftware evolves, the
#Immuneoperator
# vaccine
# test case prioritization
# regression testing
#GA
#IPA
A Group based Fault Tolerant Scheduling
Abstract: Desktop grid is an exciting discipline for high thr oughput applications but due to inherent resource v olatility,
#
Modelling Concurrent Mobile Transactions Execution in Broadcasting Environments
1
#Wireless broadcast
# data organization
# mobile transactions
Discrete Time NHPP Models for Software Reliability Growth Phenomenon
#Software engineering
# software testing
# software re liability
# software reliability growth model
# nonhomogeneous poissonprocess
#testoccasions
An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques
Abstract: Nowadays, the vital parts of the business programs are the data warehouses and the data mining techni ques.
# Data warehousing system
# data cleaning
# data transf ormation
# data loading
# dirty data
# RFID
# suspicious tags
The Veracious Counting Bloom Filter
works on dynamic sets rather than a static set via item insertions and deletions. CBF allows false positive, but not false
#
Diagnosis of Leptomeningeal Metastases Disease in MRI Images by Using Image Enhancement
#Cerebrospinal Fluid (CSF) examination
# Computed Tomography (CT)
# Image Enhancement methods
# Leptomeningeal Metastases
# Magnetic Resonance Imaging (MRI)
An Improved Statistical Model of Appearance under Partial Occlusion
Abstract: The Appearance Models (AMs) are widely used in many applications related to face recognition, expression
#Computer vision
# appearance model
# partial occlusion
# robust error functions
# CIECAM02 appearance model
An Empirical Study to Evaluate the Relationship of Object-Oriented Metrics and Change Proneness
Abstract: Software maintenance deals with changes or modifications which software goes through. Change prediction models
#Change proneness
# empirical validation
# machine learning
# object-oriented and software quality
Edge Preserving Image Segmentation using Spatially Constrained EM Algorithm
Abstract: In this paper, a new method for edge preserving image segmentation based on the Gaussian Mixture Model (GMM)
#Gaussian mixture model
# expectation maximization
# bilateral filter
# image segmentation
STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach
Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The
#DDoS attack
# IP traceback
# probabilistic packet marking
# dynamic marking
# sparsely tagged marking
1
2
3
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint