ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: But
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Federated Graph Neural Networks for Dynamic IoT Collaboration Optimization in Smart Home Environments
Cheng Zhang,Yuanquan Zhong
#IoT device collaboration
#graph neural network
#federated learning
#graph structure
#smart home
HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services
Abdelraouf Ishtaiwi,Ahmad Nabot,Omar Alzubi,Awad Ramadan,Abdulbasit Darem,Asma Alhashmi,Mohammad Alauthman,Amjad Aldweesh
#Hybrid concurrency control
#local validation
#global validation
#edge-cloud
Arabic Language Characteristics that Make its Automatic Processing Challenging
Ilhem Boulesnam,Rabah Boucetti
#Computational linguistics
#natural language processing
#Arabic natural language processing
#Arabic characteristics
#Arabic language automation
A Robust Multiwavelet-Based Watermarking Scheme for Copyright Protection of Digital Images using Human Visual System
Padmanabhareddy Vundela,Varadarajan Sourirajan
#Digital watermarking
#copyright protection
#HVS
#robust
#discrete wavelet transform
#GHM multiwavelet transform
#canny edge detection algorithm
#hausdorff distance measure
#correlation coefficient
A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques
Jamal Hussain Shah,Muhammad Sharif,Mudassar Raza,Aisha Azeem
#Linear
#non/linear
#PCA
#2DPCA
#2DKPCA
#facial feat ures extraction
#face recognition
#survey
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
Semantic Adaptation of Multimedia Documents
Azze-Eddine Maredj,Nourredine Tonkin
#Multimedia document adaptation
#semantic adaptation
#conceptual neighborhood graph
#relaxation graph
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
Modeling Fuzzy Data with Fuzzy Data Types in Fuzzy Database and XML Models
Li Yan
#Database models
#fuzzy data
#fuzzy data types
#fuzzy databases
#fuzzy XML
#modeling
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal Medical Image Fusion
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Two-Stage Method of Cervical Cancer Detection using Hybrid Classification Methods
Orasa Patsadu,Srisuda Soranunsri,Chananate Arthayukti
#Cervical cancer
#hybrid classification methods
#two stage classification
#machine learning
#healthcare
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Two-Stage Method of Cervical Cancer Detection using Hybrid Classification Methods
Orasa Patsadu,Srisuda Soranunsri,Chananate Arthayukti
#Cervical cancer
#hybrid classification methods
#two stage classification
#machine learning
#healthcare
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Application Analysis of Multi-Task Learning Algorithm in E-Commerce Personalized Advertising Intelligent Push
Min Hou,Mengze Zhang,Yizhou Zhang
#MTL algorithms
#selling point keywords
#sponsored search
#click through rate
#electronic business
#advertisement
#recommended
Leveraging Chicken Swarm Algorithm for Feature Selection Optimization Targeting Efficient Patients Backlog Elimination
Emna Bouazizi,Ayman E. Khedr,Amira M. Idrees
#Optimization
#chicken swarm optimization algorithm
#feature selection
#logistics
#supply chain management
#backlogs
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
1
2
3
4
5
6
7
8
9
10
19
20
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint