ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: speed
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Canine Disease Prediction using Multi-Directional Intensity Proportional Pattern with Correlated Textural Neural Network
Ayesha Taranum,Jyoti Metan,Prasad Yogegowda,Chandrashekar Krishnappa
#Data optimization
#pattern extraction in big data
#multi-directional intensity proportional pattern
#similarity measure system
#correlated textural neural network
#test prediction
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
Image Object and Scene Recognition Based on Improved Convolutional Neural Network
Guoyan Li,Fei Wang
#Object recognition
#deep learning
#scene recognition
#convolutional neural network
#sliding window fusion
Unmanned Target Vehicle Navigation and Path Planning Using Improved Ant Colony Optimization Algorithm Combined with GPS/BDS
Rongli Cai
#Ant colony
#BDS
#GPS
#path planning
#unmanned target vehicle
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models
Abdelraouf Ishtaiwi,Ali Ali,Ahmad Al-Qerem,Yazan Alsmadi,Amjad Aldweesh,Mohammad Alauthman,Omar Alzubi,Shadi Nashwan,Awad Ramadan,Musab Al-Zghoul,Someah Alangari
#Data-augmentation
#objects detection
#brain tumor
#yolov7
#computer vision
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Saliency Detection for Content Aware Computer Vision Applications
Manipoonchelvi Pandivalavan,Muneeswaran Karuppiah
#Content aware processing
#saliency detection
#computational visual attention
A New Way of Accelerating Web by Compressing Data with Back Reference-Prefer Geflochtener
Kushwaha Singh,Challa Krishna,and Saini Kumar
#Backward references
#shortest path technique
#HTTP
#iterative compression
#web
#LZSS and LZ77
An Unsupervised Feed Forward Neural Network Method for Efficient Clustering
Roya Asadi,Mitra Asadi,Shokoofeh Asadi
#Artificial neural network
#feed forward neural network
#unsupervised learning
#clustering
#real weight
An Efficient Perceptual of CBIR System using MIL-SVM Classification and SURF Feature Extraction
Bhuvana Shanmugam,Radhakrishnan Rathinavel,Tamije Perumal,Subhakala Subbaiyan
#SURF
#MIL-SVM
#LBG
#HI
Computational Intelligence Based Point of Interest Detection by Video Surveillance Implementations
Emre Tercan,Serkan Tapkın,Furkan Küçük,Ali Demirtaş,Ahmet Özbayoğlu,Abdussamet Türker
#Point of interest detection
#YOLO algorithm
#R-CNN
#TOOD
#deep learning
A Highly Parallelizable Hash Algorithm Based on Latin Cubes
Ming Xu
#Hash algorithm
#latin cubes
#3D attribute
#parallelism
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
Hybrid Feature Selection based on BTLBO and RNCA to Diagnose the Breast Cancer
Mohan Allam,Nandhini Malaiyappan
#Hybrid feature selection
#binary teaching learning based optimization
#neighborhood component analysis
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
Genetic Algorithm with Random and Memory Immigrant Strategies for Solving Dynamic Load Balanced Clustering Problem in Wireless Sensor Networks
Mohaideen Pitchai
#Wireless sensor networks
#genetic algorithm
#load balanced clustering
#random immigrants
#memory immigrants
Spatial Pyramid Pooling and Adaptively Feature Fusion based Yolov3 for Traffic Sign Detection
Shimin Xiong,Bin Li,Shiao Zhu,Dongfei Cui,Xiaonan Song
#Traffic sign detection
#yolov3
#spatial pyramid pooling
#adaptively spatial feature fusion
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
1
2
3
4
5
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint