ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: ANN
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Facial Expression Recognition and Classification Using Optimized EfficientNet-B7
Jenu Prabha,Vinod Kumar
#Facial expression
#recognition
#optimization
#efficientnet
#feature extraction
#deep learning
Power Inspection Robot Dog Inspection Line Planning and Autonomous Navigation Strategy
Bingye Zhang,Minjie Zhu,Haibo Li,Hongliang Zou,Xueyan Wang
#Power inspection
#a robot dog
#improved ant colony algorithm
#improved dynamic window method
#global path planning
#local path planning
Hybrid FuzzyPCA-VGG16 Framework for Classifying Pox Virus Images
K.P. Haripriya,H. Hannah Inbarani
#Classification
#VGG-16
#PCA
#fuzzy membership function
#CNN
#resnet50
#data augmentation
Facial Expression Recognition and Classification Using Optimized EfficientNet-B7
Jenu Prabha,Vinod Kumar
#Facial expression
#recognition
#optimization
#efficientnet
#feature extraction
#deep learning
Power Inspection Robot Dog Inspection Line Planning and Autonomous Navigation Strategy
Bingye Zhang,Minjie Zhu,Haibo Li,Hongliang Zou,Xueyan Wang
#Power inspection
#a robot dog
#improved ant colony algorithm
#improved dynamic window method
#global path planning
#local path planning
Hybrid FuzzyPCA-VGG16 Framework for Classifying Pox Virus Images
K.P. Haripriya,H. Hannah Inbarani
#Classification
#VGG-16
#PCA
#fuzzy membership function
#CNN
#resnet50
#data augmentation
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Constitutive Artificial Neural Network for the Construction of an English Multimodal Corpus
Junhua Li,Yuehua Li,Lihao Han
#Constitutive artificial neural network
#deep wavelet scattering transform
#honey badger algorithm
#multivariate fast iterative filtering
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction
#Stock price prediction
#machine learning
#synthetic data generation
Application of Decomposition Expression in Digital Video Object Segmentation
Jianfu Kong
#Video object segmentation
#unsupervised
#deep learning
#decomposing expression
#feature
#bottleneck operator
#foreground segmentation
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
A Neuro Phenotypic Evolution Algorithm for Recognizing Human Motion Type
Ivan Stepanyan,Safa Hameed
#Breaking up processes
#combining processes
#multi-dimensional data
#optimization
#phenotypic neuro-evolutionary
Curved Text Detection in Scenic Images via Proposal-Free Panoptic Segmentation and Deep Learning
Prachi Chhabra,Ali Abidi
#Deep learning
#image segmentation
#natural scene images
#multi-oriented text
#curved text detection
Unmanned Target Vehicle Navigation and Path Planning Using Improved Ant Colony Optimization Algorithm Combined with GPS/BDS
Rongli Cai
#Ant colony
#BDS
#GPS
#path planning
#unmanned target vehicle
1
2
3
4
5
6
7
8
9
10
11
12
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint