ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: POS
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
An Effective Management Model for Data Caching in MANET Environment
Amer Abu Salem
#MANET
#NS3
#admission control
#replacement strategy
#consistency strategy
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
A Novel Resource Scheduler for Resource Allocation and Scheduling in Big Data Using Hybrid Optimization Algorithm at Cloud Environment
Aarthee Selvaraj,Prabakaran Rajendran,Kanimozhi Rajangam
#Resource management
#particle swarm optimization
#computer performance
#data analysis
#virtualization
Joint Extraction of Organizations and Relations for Emergency Response Plans with Rich Semantic Information Based on Multi-head Attention Mechanism
Tong Liu,Haoyu Liu,Weijian Ni,Mengxiao Si
#Emergency plan
#entity-relation joint extraction
#deep learning
#attention mechanism
An Effective Reference-Point-Set (RPS) Based Bi-Directional Frequent Itemset Generation
Ambily Balaram,Nedunchezhian Raju
#Reference point
#reference-point-set
#transactional buckets
#sparse region
#dense region
Computational Intelligence Based Point of Interest Detection by Video Surveillance Implementations
Emre Tercan,Serkan Tapkın,Furkan Küçük,Ali Demirtaş,Ahmet Özbayoğlu,Abdussamet Türker
#Point of interest detection
#YOLO algorithm
#R-CNN
#TOOD
#deep learning
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
A Highly Parallelizable Hash Algorithm Based on Latin Cubes
Ming Xu
#Hash algorithm
#latin cubes
#3D attribute
#parallelism
An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools
Akshay Mudgal,Shaveta Bhatia
#Big data
#data streaming
#real time stream processing
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
Establishing Cause-Effect Relationships from Medical Treatment Data in Intensive Care Unit Settings
Mohammed Abebe Yimer,Özlem Aktaş,Süleyman Sevinç,Ali Rıza Şişman
#Capture variances
#cause-effect relationships
#causal inference
#decision making
#principal component analysis
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
Hybrid Feature Selection based on BTLBO and RNCA to Diagnose the Breast Cancer
Mohan Allam,Nandhini Malaiyappan
#Hybrid feature selection
#binary teaching learning based optimization
#neighborhood component analysis
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
Optimization of Quadrotor Route Planning with Time and Energy Priority in Windy Environments
Hayri İncekara,Murat Selek,Fatih Basciftci
#Unmanned aerial vehicles
#quadrotors
#quadrotor route planning
#windy environments
#optimization
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
An On-Site Electronic Voting System Using Blockchain and Biometrics
Shu-Fen Tu,Ching-Sheng Hsu,Bo-Long You
#Blockchain
#biometric
#distributed ledger
#e-voting
Focused Crawler Based on Reinforcement Learning and Decaying Epsilon-Greedy Exploration Policy
Parisa Begum Kaleel,Shina Sheen
#Focused web crawling
#infertility
#information retrieval
#reinforcement learning
1
2
3
4
5
6
7
8
9
10
46
47
»
All Rights reserved to IAJIT 2023
Powered by:
TurnPoint