ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: LTE
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Classification of Breast Cancer using Ensemble Filter Feature Selection with Triplet Attention Based Efficient Net Classifier
Bangalore Nagaraj Madhukar,Shivanandamurthy Hiremath Bharathi,Matta Polnaya Ashwin
#Breast cancer classification
#histopathology image
#ensemble filter feature selection
#triplet attention based EfficientNet
#TAENet
Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN
Reshma Vengaloor,Roopa Muralidhar
#Classification
#defect detection
#deep learning
#FRN structure
#yolov5
A Bi-Level Text Classification Approach for SMS Spam Filtering and Identifying Priority Messages
Naresh Kumar Nagwani
#SMS spam
#priority sms
#important sms
#sms spam filtering
#bi-level binary classification
Muzzle Classification Using Neural Networks
Ibrahim El-Henawy, Hazem El-bakry, and Hagar El-Hadad
#Muzzle classification
#image processing
#neural networks
A New Way of Accelerating Web by Compressing Data with Back Reference-Prefer Geflochtener
Kushwaha Singh,Challa Krishna,and Saini Kumar
#Backward references
#shortest path technique
#HTTP
#iterative compression
#web
#LZSS and LZ77
An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools
Akshay Mudgal,Shaveta Bhatia
#Big data
#data streaming
#real time stream processing
A Novel Codebook Generation by Smart Fruit Fly Algorithm based on Exponential Flight
Ilker Kilic
#Metaheuristic optimization technique
#fruit fly algorithm
#image compression
#codebook generation
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
Utilizing Artificial Bee Colony Algorithm as Feature Selection Method in Arabic Text Classification
Musab Mustafa Hijazi,Akram Zeki,Amelia Ismail
#Artificial bee colony
#Arabic text classification
#wrapper feature selection
#feature selection
A Topic-Specific Web Crawler using Deep Convolutional Networks
Saed ALqaraleh,Hatice Meltem Nergız Sırın
#CNN
#natural language processing
#text classification
#topic specific crawler
#focused crawler
#web crawling
An Efficient Method for Contrast Enhancement of
1
#
Lightweight Anti-Censorship Online Network for
Division of Electronic and Information Engineering, Chonbuk National University, Republic of Korea
#
Qaisar Abbas1, Irene Fondo´n2, and Emre Celebi3 1College of Computer and Information Sciences, Al Im am Mohammad Ibn Saud Islamic University,
#
A New Algorithm for Finding Vertex-Disjoint Paths
Abstract: The fact that the demands which could be labelled a s “luxurious” in the past times, have became requirements
#
Enhancing Generic Pipeline Model for Code Clone Detection using Divide and Conquer Approach
code clone research focuses on the detection and an alysis of code clones in order to help software developers identify code
# Code clone detection
# divide and conquer approach
# generic pipeline model
A Vision Approach for Expiry Date Recognition using Stretched Gabor Features
Abstract: Product"expiry date represent important information for products consumption. They must contain clear
#
Automated Retinal Vessel Segmentation using
Soumia Belhadi and Nadjia Benblidia
#
Two Layer Defending Mechanism against DDoS Attacks
# DDoS
# hop count
# IP2HC table
# clustering
# IP spoofi ng
# testbed
# Job scheduling
# data replication
# RC
# replica manag er
# resource discovery
# counting bloom filter
1
2
3
4
5
6
7
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint