ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: DR
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Enhancing Smart Farming with IoT Sensors Using FRPGW and HALSTM for Accurate Predictions
Fathima ShreneShifna,Baalaji Kadarkarai
#IoT smart farming
#agriculture
#FRPGW
#HALSTM
#ANN
#LSTM
Integrating UAV Networks and Edge Computing for Smart Cities: Architecture, Techniques, and Future Trends
Antima Jain,Mohammad Muqeem,Muhammad Uzair,Mohammad Ahmed,Anand Rajawat,Ahmad Khan*,Mohammad Hussain,Mohammad Hussain*,Arshad Ali
#UAVs
#wearble devices
#XAI
#consumer electronics
#personalized health monitoring
#data transparency and ethics
Triple Transformer Ensemble Fusion Method for Pox Virus Classification
K.P. Haripriya,H. Hannah Inbarani
#Vision transformer
#DEiT
#mobile_ViT transformer
#ensemble methods
#classification
#medical images
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera Video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Location-Based Routing Protocol with Optimized Data Aggregation for Vehicular Ad Hoc Networks (VANETs)
Abdelkrim Houacine,Mansour Mekour
#VANETs
#dynamic routing
#data efficiency
#location-aware communication
#mobility optimization
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
Precision Pursuit: A Spectral Decomposition- Driven Adaptive Block Measurement Matrix for
Enhanced Compressive Sensing in Imaging,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Location-Based Routing Protocol with Optimized Data Aggregation for Vehicular Ad Hoc Networks (VANETs)
Abdelkrim Houacine,Mansour Mekour
#VANETs
#dynamic routing
#data efficiency
#location-aware communication
#mobility optimization
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
1
2
3
4
5
6
7
8
9
10
17
18
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint