ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: service
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Adaptive Software Development: A Comprehensive Framework Integrating Artificial Intelligence for Sustainable Evolution
Yaya Gadjama Soureya,Ngoumou Amougou,Justin Moskolai Ngossaha,Samuel Bowong Tsakou,Marcel Fouda Ndjodo
#Sustainability
#evolution
#quality of service
#SPL
#AI
#IoT
#connected homes
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
Optimizing Machine Learning-based Sentiment Analysis Accuracy in Bilingual Sentences via Preprocessing Techniques
Mohammed Maree,Mujahed Eleyat,Enas Mesqali
#Machine learning
#bilingual sentiment analysis
#NLP
#sentiment datasets
Optimizing Machine Learning-based Sentiment Analysis Accuracy in Bilingual Sentences via Preprocessing Techniques
Mohammed Maree,Mujahed Eleyat,Enas Mesqali
#Machine learning
#bilingual sentiment analysis
#NLP
#sentiment datasets
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
A Bi-Level Text Classification Approach for SMS Spam Filtering and Identifying Priority Messages
Naresh Kumar Nagwani
#SMS spam
#priority sms
#important sms
#sms spam filtering
#bi-level binary classification
A Novel Resource Scheduler for Resource Allocation and Scheduling in Big Data Using Hybrid Optimization Algorithm at Cloud Environment
Aarthee Selvaraj,Prabakaran Rajendran,Kanimozhi Rajangam
#Resource management
#particle swarm optimization
#computer performance
#data analysis
#virtualization
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Spatial and Semantic Information Enhancement for Indoor 3D Object Detection
Chunmei Chen,Zhiqiang Liang,Haitao Liu,Xin Liu
#3D object detection
#edge convolution
#attention mechanism
#spatial information
#semantic information
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
IoT Based Technique for Network Packet Analyzer
Nouh Alhindawi
#Internet of things
#packet analyzers
#networks monitoring
#cloud processing
A New Algorithm for Finding Vertex-Disjoint Paths
Abstract: The fact that the demands which could be labelled a s “luxurious” in the past times, have became requirements
#
Smelling the Web Olfactory Display for Web
Saad Abid2, Zhiyong Li1, and Renfa Li1 1College of Information Science and Engineering, Hun an University, China 2Department of Computer Science and Informatics, Al- Mansour University College, Iraq
#
Two Layer Defending Mechanism against DDoS Attacks
# DDoS
# hop count
# IP2HC table
# clustering
# IP spoofi ng
# testbed
Speed up of Reindexing in Adaptive Particle Swarm Optimization
#
# Software tempering
# software reversing
# cryptograph y
# watermarking
# digital rights management
Thomas Brindha and Ramaswamy Shaji
#
Implementation of Image Processing System using Handover Technique with Map Reduce Based on Big Data in the Cloud Environment
#
1
2
3
4
5
6
7
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint