ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Operation
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Inventory Optimization Using Data Science Technologies for Supply Chain 4.0
Emna Bouazizi,Ayman Khedr,Sherin Elfaioumy,Mohamed Belal
#Supply chain 4.0
#inventory management
#regression algorithm
#optimization
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
Image Encryption Using Modified Perturbed Logistic Map
Subhashini Kumaran,Amutha Ramachandran
#Improved zig zag transformation
#image encryption
#decoding
#DNA operations
#modified perturbed logistic map
#quaternary DNA encoding
Canine Disease Prediction using Multi-Directional Intensity Proportional Pattern with Correlated Textural Neural Network
Ayesha Taranum,Jyoti Metan,Prasad Yogegowda,Chandrashekar Krishnappa
#Data optimization
#pattern extraction in big data
#multi-directional intensity proportional pattern
#similarity measure system
#correlated textural neural network
#test prediction
Image Object and Scene Recognition Based on Improved Convolutional Neural Network
Guoyan Li,Fei Wang
#Object recognition
#deep learning
#scene recognition
#convolutional neural network
#sliding window fusion
A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
Laid Kenioua,Brahim Lejdel,Mohamed Abdelhamid Nedioui
#Autonomous vehicles
#positioning security
#secure communication
#semi-decentralized collaboration architecture
#edge computing
#data collection
#consensus
RSO based Optimization of Random Forest Classifier for Fault Detection and Classification in Photovoltaic Arrays
Khaled Baradieh,Mohd Zainuri,Mohamed Kamari,Yushaizad Yusof,Huda Abdullah,Mohd Zaman,Mohd Zulkifley
#Classifier
#diagnosis
#fault classification
#fault detection
#machine learning
#optimization
#photovoltaic
#pv
#random forest
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
From Neutrosophic Soft Set to Effective Neutrosophic Soft Set Generalizations and Applications
Sumyyah Al-Hijjawi,Abd Ghafur Ahmad,Shawkat Alkhazaleh
#Soft set
#neutrosophic soft set
#effective set
#effective fuzzy soft set
#effective neutrosophic soft set
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
Muzzle Classification Using Neural Networks
Ibrahim El-Henawy, Hazem El-bakry, and Hagar El-Hadad
#Muzzle classification
#image processing
#neural networks
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
A Simple and Stable Method of Creating Fingerprint Features With Image Rotation
Mohamad Al-Laham,Mohammad Al-Ma'aitah,Ziad Alqadi
#Fingerprint features
#hit-and-miss
#bifurcation
#isolated point
#crossover
#connected points
#MAS
# CF
# volume discount
# search cost
# stability
KP-TrieAlgorithmfor Update and Search Operations
Abstract:Radix-Tree is a space optimized data structure that performs data compression by means of cluster nodes that share
#Trie
# radix tree
# data structure
# branch factor
# indexing
# tree structure
# information retrieval
Hierarchical Based Group Key Transfer for Secure
1Department of Information Science and Technology, A nna University, India
#
1
2
3
4
5
ยป
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint