ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Operation
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Symmetric Classes of Series-Parallel Digraphs
Ruzayn Quaddoura
#Digraphs
#series-parallel digraphs
#design and analysis of algorithms
#complexity
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
From Neutrosophic Soft Set to Effective Neutrosophic Soft Set Generalizations and Applications
Sumyyah Al-Hijjawi,Abd Ghafur Ahmad,Shawkat Alkhazaleh
#Soft set
#neutrosophic soft set
#effective set
#effective fuzzy soft set
#effective neutrosophic soft set
Research on the Innovation of College English Teaching Mode from the Perspective of VR/AR Technology
Hui Jiang
#VR/AR technology
#college English
#teaching mode
#innovation
Inventory Optimization Using Data Science Technologies for Supply Chain 4.0
Emna Bouazizi,Ayman Khedr,Sherin Elfaioumy,Mohamed Belal
#Supply chain 4.0
#inventory management
#regression algorithm
#optimization
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
Image Encryption Using Modified Perturbed Logistic Map
Subhashini Kumaran,Amutha Ramachandran
#Improved zig zag transformation
#image encryption
#decoding
#DNA operations
#modified perturbed logistic map
#quaternary DNA encoding
Canine Disease Prediction using Multi-Directional Intensity Proportional Pattern with Correlated Textural Neural Network
Ayesha Taranum,Jyoti Metan,Prasad Yogegowda,Chandrashekar Krishnappa
#Data optimization
#pattern extraction in big data
#multi-directional intensity proportional pattern
#similarity measure system
#correlated textural neural network
#test prediction
Image Object and Scene Recognition Based on Improved Convolutional Neural Network
Guoyan Li,Fei Wang
#Object recognition
#deep learning
#scene recognition
#convolutional neural network
#sliding window fusion
A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
Laid Kenioua,Brahim Lejdel,Mohamed Abdelhamid Nedioui
#Autonomous vehicles
#positioning security
#secure communication
#semi-decentralized collaboration architecture
#edge computing
#data collection
#consensus
RSO based Optimization of Random Forest Classifier for Fault Detection and Classification in Photovoltaic Arrays
Khaled Baradieh,Mohd Zainuri,Mohamed Kamari,Yushaizad Yusof,Huda Abdullah,Mohd Zaman,Mohd Zulkifley
#Classifier
#diagnosis
#fault classification
#fault detection
#machine learning
#optimization
#photovoltaic
#pv
#random forest
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
Muzzle Classification Using Neural Networks
Ibrahim El-Henawy, Hazem El-bakry, and Hagar El-Hadad
#Muzzle classification
#image processing
#neural networks
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
A Simple and Stable Method of Creating Fingerprint Features With Image Rotation
Mohamad Al-Laham,Mohammad Al-Ma'aitah,Ziad Alqadi
#Fingerprint features
#hit-and-miss
#bifurcation
#isolated point
#crossover
#connected points
1
2
3
4
5
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint