ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: vector
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera Video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Arab Face Recognition and Identification Based on Ethnicity and Gender Using Machine Learning
Mohammed Abual-Rub,Khalid Nahar,Ammar Almomani,Firas Alzobi
#Ethnicity
#facial recognition
#neural network
#multi-class classification
#machine learning
#facial features
Feature Selection Method Based on Consecutive Forward Selection and Backward Elimination Concepts Using a Weighted Vector
Luai Al-Shalabi
#Feature selection
#forward-backward
#chi-square
#classification
A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques
Jamal Hussain Shah,Muhammad Sharif,Mudassar Raza,Aisha Azeem
#Linear
#non/linear
#PCA
#2DPCA
#2DKPCA
#facial feat ures extraction
#face recognition
#survey
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with AlexNet
Muhammad Waqas Ahmed,Abdulwahab Alazeb,Naif Al Mudawi,Touseef Sadiq,Bayan Alabdullah,Hameed ur Rahman,Asaad Algarni,Ahmad Jalal
#Pattern recognition
#alexNet
#fish swarm algorithm
#object detection
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with
AlexNet, Abdulwahab Alazeb, Naif Al Mudawi, Touseef Sadiq, Bayan Alabdullah, Hameed ur Rahman, Asaad Algarni, Ahmad Jalal
#Pattern recognition
# alexNet
# fish swarm algorithm
# object detection
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Classification
Vivine Nurcahyawati,Zuriani Mustaffa,Mohammed Khalaf
#Lexicon-based
#classification
#customer
#review
#text analysis
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
Constitutive Artificial Neural Network for the Construction of an English Multimodal Corpus
Junhua Li,Yuehua Li,Lihao Han
#Constitutive artificial neural network
#deep wavelet scattering transform
#honey badger algorithm
#multivariate fast iterative filtering
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Cl
Ghadeer
#Lexicon-based
#classification
#customer
#review
#text analysis
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Classification
Vivine Nurcahyawati,Zuriani Mustaffa,Mohammed Khalaf
#Lexicon-based
#classification
#customer
#review
#text analysis
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
1
2
3
4
5
6
7
8
9
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint