ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: NER
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
A Novel Resource Scheduler for Resource Allocation and Scheduling in Big Data Using Hybrid Optimization Algorithm at Cloud Environment
Aarthee Selvaraj,Prabakaran Rajendran,Kanimozhi Rajangam
#Resource management
#particle swarm optimization
#computer performance
#data analysis
#virtualization
Joint Extraction of Organizations and Relations for Emergency Response Plans with Rich Semantic Information Based on Multi-head Attention Mechanism
Tong Liu,Haoyu Liu,Weijian Ni,Mengxiao Si
#Emergency plan
#entity-relation joint extraction
#deep learning
#attention mechanism
An Effective Reference-Point-Set (RPS) Based Bi-Directional Frequent Itemset Generation
Ambily Balaram,Nedunchezhian Raju
#Reference point
#reference-point-set
#transactional buckets
#sparse region
#dense region
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools
Akshay Mudgal,Shaveta Bhatia
#Big data
#data streaming
#real time stream processing
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
Live Virtual Machine Migration in Fog Computing: State of the Art
Shahd Alqam,Nasser Alzeidi,Abderrezak Touzene,Khaled Day
#Live virtual machine migration
#conventional algorithms
#fog computing architecture
#live migration algorithms classification
#artificial intelligence
#framework modeling
A Robot Path Planning Method Based on Synergy Behavior of Cockroach Colony
Le Cheng,Lyu Chang,Yanhong Song,Haibo Wang,Yuetang Bian
#Cooperative learning
#robot path planning
#fibonacci transformation
#controlling parameters
#path compression technique
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
Application of Intelligent Adaptive Neuro Fuzzy Method for Reusability of Component Based Software System
Jyoti Agarwal,Manoj Kumar,Mugdha Sharma,Deepak Verma,Richa Sharma
#Component
#reusability
#software
#fuzzy
#ANFIS
#interface complexity
#understandability
#customizability
#reliability
Optimization of Quadrotor Route Planning with Time and Energy Priority in Windy Environments
Hayri İncekara,Murat Selek,Fatih Basciftci
#Unmanned aerial vehicles
#quadrotors
#quadrotor route planning
#windy environments
#optimization
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
Focused Crawler Based on Reinforcement Learning and Decaying Epsilon-Greedy Exploration Policy
Parisa Begum Kaleel,Shina Sheen
#Focused web crawling
#infertility
#information retrieval
#reinforcement learning
TSO Clustered Protocol to Extend Lifetime of IoT Based Mobile Wireless Sensor Networks
Giji Kiruba Dasebenezer,Benita Joselin
#MWSN
#clustering
#sensor nodes
#TSO
#PSO
Genetic Algorithm with Random and Memory Immigrant Strategies for Solving Dynamic Load Balanced Clustering Problem in Wireless Sensor Networks
Mohaideen Pitchai
#Wireless sensor networks
#genetic algorithm
#load balanced clustering
#random immigrants
#memory immigrants
A Novel Codebook Generation by Smart Fruit Fly Algorithm based on Exponential Flight
Ilker Kilic
#Metaheuristic optimization technique
#fruit fly algorithm
#image compression
#codebook generation
Intelligent Recognition of Gas-Liquid Two-Phase Flow Based on Optical Image
Shujuan Wang,Haofu Guan,Yuqing Wang,Kanghui Zhang,Yuntao Dai,Shouxu Qiao,Jihong Shen
#Optical image
#gas-liquid two-phase flow
#machine vision
#FCN
#U-Net
Generating Embedding Features Using Deep Learning for Ethnics Recognition
Mohammed Alghaili,Zhiyong Li,Ahmed AlBdairi,Malasy Katiyalath
#Computer vision
#machine learning
#ethnics identification
#deep learning
1
2
3
4
5
6
7
8
9
10
19
20
»
All Rights reserved to IAJIT 2023
Powered by:
TurnPoint