ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: three
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
From Neutrosophic Soft Set to Effective Neutrosophic Soft Set Generalizations and Applications
Sumyyah Al-Hijjawi,Abd Ghafur Ahmad,Shawkat Alkhazaleh
#Soft set
#neutrosophic soft set
#effective set
#effective fuzzy soft set
#effective neutrosophic soft set
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models
Abdelraouf Ishtaiwi,Ali Ali,Ahmad Al-Qerem,Yazan Alsmadi,Amjad Aldweesh,Mohammad Alauthman,Omar Alzubi,Shadi Nashwan,Awad Ramadan,Musab Al-Zghoul,Someah Alangari
#Data-augmentation
#objects detection
#brain tumor
#yolov7
#computer vision
Narwhal Optimizer: A Novel Nature-Inspired Metaheuristic Algorithm
Seyyid Ahmed Medjahed,Fatima Boukhatem
#Narwhal optimizer
#meta-heuristic
#optimization
#nature-inspired algorithms
#swarm intelligence
A Framework for Saudi Uniform Gait Recognition Based on Kinect Skeletal Tracking
Jawad H. Alkhateeb,Ehsan Owaidah,Aiman Turani,Rashiq Marie,Aladdein Amro,Ahmad A. Mazhar
#Biometric system
#gait recognition
#kinect sensor
#KNN
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
A Framework for Saudi Uniform Gait Recognition Based on Kinect Skeletal Tracking
Jawad H. Alkhateeb,Aiman Turani,Rashiq Marie,Aladdein Amro,Ahmad A. Mazhar
#Biometric system
#gait recognition
#kinect sensor
#KNN
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
Evaluation Model of Athletes’ Lower Extremity Training Ability Based on LSTM Algorithm
Yuanyuan Gao,Qiang Qian,Xuefeng Sun,Jiankun An,Yutao Yuan
#Short-term memory network
#athletes
#lower extremity motor ability
#evaluation model
Simultaneously Identifying Opinion Targets and Opinion-bearing Words Based on Multi-Features in Chinese Micro-Blog Texts
Quanchao Liu,Heyan Huang,Chong Feng
#Opinion mining
#opinion target identification
#micro-blog
#feature-opinion pairs
#sentiment polarity
Saliency Detection for Content Aware Computer Vision Applications
Manipoonchelvi Pandivalavan,Muneeswaran Karuppiah
#Content aware processing
#saliency detection
#computational visual attention
Speech Scrambling based on Independent Component Analysis and Particle Swarm Optimization
Nidaa Abbas,Jahanshah Kabudian
#ICA
#itakura-saito distance
#LPC
#PSO
#speech scrambling
#SNR
Pattern Recognition Using the Concept of Disjoint Matrix of MIMO System
Mezbahul Islam,Rahmina Rubaiat,Imdadul Islam,Mostafizur Rahaman,Mohamed Ruhul Amin
#Uncoupled MIMO links
#eigenvalues
#unitary matrix
#noise and channel matrix
Image Compression based on Iteration-Free Fractal and using Fuzzy Clustering on DCT Coefficients
Sobia Mahalingam,Valarmathi Lakshapalam,Saranya Ekabaram
#Fractal image compression
#fuzzy clustering
#DCT coefficients
#contractive affine transformation
An Effective Management Model for Data Caching in MANET Environment
Amer Abu Salem
#MANET
#NS3
#admission control
#replacement strategy
#consistency strategy
An Effective Reference-Point-Set (RPS) Based Bi-Directional Frequent Itemset Generation
Ambily Balaram,Nedunchezhian Raju
#Reference point
#reference-point-set
#transactional buckets
#sparse region
#dense region
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
Design and Study of Zombie Enterprise Classification and Recognition Systems Based on Ensemble Learning
Shutong Pang,Ziwei Yang,Chengyou Cai,Zhimin Li
#Integrated learning
#corporate portrait
#classification and identification
#strong supervision model
1
2
3
4
5
6
7
8
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint