ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Algorithm
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Neural Volumetric Representations for Real-Time 3D Scene Reconstruction Using Multi-Modal
Learning Algorithm,Preeti Jha
#Deepvoxels
#neural rendering technique
#NeRF
#MMLA
Archery Human Pose Estimation System Based on DFPDeblur GAN Algorithm
Xiao Yan,Zhuohan Wu,Ting Wang
#Archery sport
#attitude estimation
#DFPDeblur GAN
#HRNet
#deblurring
Enhancing Smart Farming with IoT Sensors Using FRPGW and HALSTM for Accurate Predictions
Fathima ShreneShifna,Baalaji Kadarkarai
#IoT smart farming
#agriculture
#FRPGW
#HALSTM
#ANN
#LSTM
Enhancing Motor Imagery EEG Classification Accuracy Using Weight Features Function
Abdel Fateh Doudou,Aicha Reffad,Kamel Mebarkia
#brain-computer interface
#features extraction
#genetic algorithm
#motor imagery
#SVM classifier
Stimulating the Efficiency of Massive MIMO Cooperative NOMA Applying RIS in 6G Networks
Mohamed Hassan,Khalid Hamid,Elmuntaser Hassan,Imadeldin Elmutasim,Izzeldin Mohamed
#Cooperative NOMA
#massive MIMO
#CR
#RIS
#SE
#millimeter-wave
Neural Volumetric Representations for Real-Time 3D Scene Reconstruction Using Multi-Modal
Learning Algorithm, Preeti Jha
#Deepvoxels
# neural rendering technique
# NeRF
# MMLA
Innovative Approach for Brain Tumor Image Classification with Novel Optimized Feedforward Networks
Raafat Munshi
#Brain tumor image classification
#AMFO-FNN
#gaussian filter
#GLCM
#medical imaging
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Improving Student Engagement in College Education with Fuzzy Control Algorithm
Yan Chen
#Fuzzy controller
#mamdani fuzzy inference system
#adaptive control
#modified salp swarm
#engagement level
1
2
3
4
5
6
7
8
9
10
32
33
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint