ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: time
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Investigation of Chat GPT’s Impact on Education Using Deep Spectral-Spatial Residual Attention Networks
Walaa Ismail,Howida Youssry
#Chat generative pre-trained transformer
#continuous-discrete derivative-free extended Kalman filter
#deep spectral-spatial residual attention network
#parrot optimization algorithm
#synchro-transient- extraction transform
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Determining PolyCystic Ovarian Syndrome Severity from Reddit Posts using Topic Modelling and Association Rule Mining
Santhi Selvaraj,Selva Nidhyananthan Sundaradhas
#Association rule mining
#bag of words
#frequent symptoms set
#PCOS
#topic modelling
Hierarchical Method for Automated Text Documents Classification
Mohamed H. Mousa,Ayman E. Khedr,Amira M. Idrees
#Classification
#knowledge discovery
#text mining
#feature selection
#TF-IDF
#natural language processing
#hierarchical based
Application of Decomposition Expression in Digital Video Object Segmentation
Jianfu Kong
#Video object segmentation
#unsupervised
#deep learning
#decomposing expression
#feature
#bottleneck operator
#foreground segmentation
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
EEG Signal Recognition of VR Education Game Players Based on Hybrid Improved Wavelet Threshold and LSTM
Yang Li,Haiyu Zhang
#EEG signal
#wavelet threshold method
#LSTM
#VR
#EEMD
Design and Implementation of Sports Network Teaching Platform Based on Discrete Similarity Method
Jian Cui,Lan Shi
#Adaptive savitzky-golay filtering
#chaotic satin bower bird optimization
#multi‐hypothesis fuzzy‐matching radon transform and sports network teaching
Based on Correlation Analysis and K-Means: An Anomaly Detection Algorithm for Seasonal Time-Series Data
Xin Wang,Yingxue Yang,Xueshuang Ding,Yantao Zhao
#Anomaly detection
#seasonal data
#time series
#DBSCAN
#K-means
Forecasting the Spread of Viral Diseases in Jordan Using the SARIMA Statistical Model
Shahed Al-khateeb
#Time series model
#Jordan
#prediction
#diseases
#forecasting model
#sarimax
#seasonal autoregressive integrated moving-average with exogenous regressors
1
2
3
4
5
6
7
8
9
10
16
17
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint