ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: MAS
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Mohammad Alia,Adnan Hnaif,Aseel Alrawashdeh,Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Ahmad AlShanty
#Particle swarm optimization
#discrete wavelet transform
#discrete cosine transform
#denosing network
#additive white gaussian noise
#peak signal-to-noise ratio
#normalized correlation coefficient
Disease Prognosis of Fetal Heart’s Four-Chamber and Blood Vessels in Ultrasound Images Using CNN Incorporated VGG 16 and Enhanced DRNN
Someshwaran Gunasekaran,Sarada Vivekasaran
#Fetal heart disease
#ultrasound images
#augmented wiener filter
#median modified wiener filter
#region of interest
#convolutional neural network
#visual geometry group 16
#deep recurrent neural network
Nature-Inspired Metaheuristic Algorithms: A Comprehensive Review
Mohammad Shehab,Rami Sihwail,Mohammad Daoud,Hani Al-Mimi,Laith Abualigah
#Optimization algorithms
#metheuristic algorithms
#heuristic strategies
#local search techniques
#global search techniques
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction
Nur Aliah Syahmina Mohd Nazarudin,Nor Hapiza Mohd Ariffin,Ruhaila Maskat
#Stock price prediction
#machine learning
#synthetic data generation
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Saliency Detection for Content Aware Computer Vision Applications
Manipoonchelvi Pandivalavan,Muneeswaran Karuppiah
#Content aware processing
#saliency detection
#computational visual attention
Evolutionary Computing Model for Finding Breast Cancer Masses using Image Enhancement Procedures with Artificial Intelligent Algorithms
Dhivya Samraj,Kuppuchamy Ramasamy,Muralidharan Karuppusamy
#Image enhancement
#breast cancer
#histogram equalization
#particle swarm optimization
#analysis
Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions
Nura Shifa Musa,Nada Masood Mirza,Adnan Ali
#Digital forensic
#internet of things
#internet of things forensics
#forensic investigation process
#challenges
#emerging solutions
A Topic-Specific Web Crawler using Deep Convolutional Networks
Saed ALqaraleh,Hatice Meltem Nergız Sırın
#CNN
#natural language processing
#text classification
#topic specific crawler
#focused crawler
#web crawling
Qaisar Abbas1, Irene Fondo´n2, and Emre Celebi3 1College of Computer and Information Sciences, Al Im am Mohammad Ibn Saud Islamic University,
#
Exploring the Potential of Schemes in Building NLP
LaTICE Laboratory, Faculty of Sciences of Monastir, Tunisia
#
Privacy-Preserving Data Mining in Homogeneous
Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#
Adaptive Semantic Indexing of Documents for Locating Relevant Information in P2P Networks
Abstract: Locating relevant information in Peer#to#Peer (P2P) system is a challenging problem. Conventional approaches use
#
An Improved Iterative Segmentation Algorithm using Canny Edge Detector for Skin Lesion Border Detection
1 and Mohamed Sathik2 1National College of Engineering, India 2Department of Computer Science, Sadakathullah Appa College, India
# Melanoma
# canny edge detector
# border detection
# se gmentation
# skin lesion
#MAS
# CF
# volume discount
# search cost
# stability
Thomas Brindha and Ramaswamy Shaji
#
Unconstraint Assignment Problem: A Molecular Computing Approach Ibrahim Zuwairie1&2, Tsuboi Yusei2, Ono Osamu2, and Khalid Marzuki3
Abstract:Deoxyribonucleic Acid or DNA-based computing is an emerging field that bridging the gap between chemistry,
#DNA computing
# assignment problem
# optimization
1
2
3
4
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint