ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: CK
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Enhancing Smart Farming with IoT Sensors Using FRPGW and HALSTM for Accurate Predictions
Fathima ShreneShifna,Baalaji Kadarkarai
#IoT smart farming
#agriculture
#FRPGW
#HALSTM
#ANN
#LSTM
Malware Detection through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
ARCNet: A Novel Deep Learning Model for Robust Solid Waste Image Classification in Waste Management Systems
Velmurugan Lingamuthu,Devaraju Sellappan,Sakthivel Balu,Sheik Mohammed Abdul Raghabu,Aanjankumar Sureshkumar,Prabu Kanna Govindarajan
#Solid waste management
#classification
#ARCNet
#global context attention module
Stimulating the Efficiency of Massive MIMO Cooperative NOMA Applying RIS in 6G Networks
Mohamed Hassan,Khalid Hamid,Elmuntaser Hassan,Imadeldin Elmutasim,Izzeldin Mohamed
#Cooperative NOMA
#massive MIMO
#CR
#RIS
#SE
#millimeter-wave
Triple Transformer Ensemble Fusion Method for Pox Virus Classification
K.P. Haripriya,H. Hannah Inbarani
#Vision transformer
#DEiT
#mobile_ViT transformer
#ensemble methods
#classification
#medical images
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera Video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Location-Based Routing Protocol with Optimized Data Aggregation for Vehicular Ad Hoc Networks (VANETs)
Abdelkrim Houacine,Mansour Mekour
#VANETs
#dynamic routing
#data efficiency
#location-aware communication
#mobility optimization
Precision Pursuit: A Spectral Decomposition- Driven Adaptive Block Measurement Matrix for
Enhanced Compressive Sensing in Imaging,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Location-Based Routing Protocol with Optimized Data Aggregation for Vehicular Ad Hoc Networks (VANETs)
Abdelkrim Houacine,Mansour Mekour
#VANETs
#dynamic routing
#data efficiency
#location-aware communication
#mobility optimization
1
2
3
4
5
6
7
8
9
10
29
30
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint