ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: time
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
GNN-DQL-Based Chronic Kidney Disease Classification Using GFR in the Internet of Medical Things Environment
Bhavani Tatiparti,Vydeki Dharmar
#Deep learning
#neural network
#Q-learning
#glomerular filtration rate
#mayfly optimization
#optimal features
#parameter optimization
#AMO
Modularization in Dual System and Occupational Self-governance Concerns Employing the Fuzzy Control Algorithm in Vocational Education Personnel Training
Jinyuan Li,Yuqi Cheng
#Fuzzy control
#modularization
#personnel training
#vocational education
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
GNN-DQL-Based Chronic Kidney Disease Classification Using GFR in the Internet of Medical Things Environment
Bhavani Tatiparti,Vydeki Dharmar
#Deep learning
#neural network
#Q-learning
#glomerular filtration rate
#mayfly optimization
#optimal features
#parameter optimization
#AMO
Modularization in Dual System and Occupational Self-governance Concerns Employing the Fuzzy Control Algorithm in Vocational Education Personnel Training
Jinyuan Li,Yuqi Cheng
#Fuzzy control
#modularization
#personnel training
#vocational education
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Investigation of Chat GPT’s Impact on Education Using Deep Spectral-Spatial Residual Attention Networks
Walaa Ismail,Howida Youssry
#Chat generative pre-trained transformer
#continuous-discrete derivative-free extended Kalman filter
#deep spectral-spatial residual attention network
#parrot optimization algorithm
#synchro-transient- extraction transform
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Determining PolyCystic Ovarian Syndrome Severity from Reddit Posts using Topic Modelling and Association Rule Mining
Santhi Selvaraj,Selva Nidhyananthan Sundaradhas
#Association rule mining
#bag of words
#frequent symptoms set
#PCOS
#topic modelling
Hierarchical Method for Automated Text Documents Classification
Mohamed H. Mousa,Ayman E. Khedr,Amira M. Idrees
#Classification
#knowledge discovery
#text mining
#feature selection
#TF-IDF
#natural language processing
#hierarchical based
1
2
3
4
5
6
7
8
9
10
16
17
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint