ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: requirement
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Induction of Co-existing Items Available in Distributed Version Control Systems for Software Development
Sibel Özyer
#Version control systems
#requirement analysis
#co-occurrence analysis
#natural language processing
An On-Site Electronic Voting System Using Blockchain and Biometrics
Shu-Fen Tu,Ching-Sheng Hsu,Bo-Long You
#Blockchain
#biometric
#distributed ledger
#e-voting
Linking Palliative Homecare to the Universal Health Coverage Principles and the United Nations Sustainability Development Goals Using the i* Framework’s Strategic and Social Requirements Modelling, Applied to a Cancer Care Organisation
Yousra Odeh,Dina Tbaishat,Faten F. Kharbat,Omar Shamieh,Mohammed Odeh
#Universal health coverage
#UNSDGs
#i* framework
#home health care
#palliative care
#goal-oriented modelling
#social requirements modelling
#cancer care process modelling
#cancer care informatics
#cancer care sociotechnical systems
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
Digital Forensics Techniques and Trends: A Review
Himanshu Dubey,Shobha Bhatt,Lokesh Negi
#Digital forensics
#digital evidence
#digital investigation model
#digital forensic tool
Exploring the Performance of Farasa and CAMeL Taggers for Arabic Dialect Tweets
Aseel Alfaidi,Hajer Alwadei,Areej Alshutayri,Shahd Alahdal
#Dialect arabic tweets
#POS
#POS tagging
#MSA tagger
#farasa tagger
#CAMeL tagger
A New Algorithm for Finding Vertex-Disjoint Paths
Abstract: The fact that the demands which could be labelled a s “luxurious” in the past times, have became requirements
#
Event Extraction from Classical Arabic Texts
Abstract: Event extraction is one of the most useful and chal lenging Information Extraction (IE) tasks that can be used in
#
#Image capture
# image store
# image compression
# join t photographic experts group
# PSNR
# compression rat io
# CMOS image sensor
# VLSI implementation
#English auction
# bilinear pairings
# bilinear Diffi e*Hellman problem
# hash function
iHPProxy:Improving the Performance of HPProxy by Adding Extra Hot-Points
Abstract:In recent years, the interest of Internet users turned intoviewingvideos such asVideo-on-Demand (VoD), online
#Proxycaching
# shift distance
#HPProxy
# cache replacement
# multimedia streaming
#VoD
A NewModel for Software Inspection at the Requirements Analysis and Design Phases of
Department of Software Engineering, University of Malaya, Malaysia
#Softwareinspection
# software test
# software engineering improvement
# web-based solution
# software inspection tool
# inspection metrics
Sudhanshu Gupta and Deepak Garg
#
A General Characterization of Representing and
Aeronautics and Astronautics, China
#Fuzzy spatial data
# fuzzy point
# fuzzy line
# fuzzy region
# fuzzy spatial relations
Incompatibility Dimensions and Integration of Atomic Commit Protocols
Abstract: Advanced software application systems contain transactions that tend to traverse incompatible database sites
#Two-phase commit
# voting protocols
# distributed transaction processing
# integrated database systems
# internet transactions
# electronic services and electronic commerce
1
2
3
4
5
6
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint