ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: RSA
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose and Esophagus Studies
Muhammad Siddiqi,Yousef Alhwaiti,Said Elaiwat,Marwan Abu-Zanona
#Computer vision
#image morphing
#warping
#face matching
#forward algorithm
#backward algorithm
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction
#Stock price prediction
#machine learning
#synthetic data generation
Detecting Spam Reviews in Arabic by Deep Learning
Eman Aljadani,Fatmah Assiri,Areej Alshutayri
#Spam reviews
#spam reviews detection
#arabic language
#deep learning
#convolutional neural network
#bidirectional long short-term memory
Insights into Automated Attractiveness Evaluation from 2D Facial Images: A Comprehensive Review
Ali Ibrahem,Jwan Saeed,Adnan Abdulazeez
#Facial beauty prediction
#facial attractiveness assessment
#beauty hypotheses
#beauty computation model
Cyberbullying Detection in Social Networks Using Deep Learning
Hayel Khafajeh
#Cyberbullying detection
#deep learning
#social networks
#convolutional neural networks
#long short-term memory
#bidirectional encoder representations from transformers
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
An Improved Classification Model for English Syntax Error Correction Design of DL Algorithm
Xue Han
#Universities
#English
#syntax error
#classification model
#neural network
#attention mechanism
Analyzing Sentiments using Optimized Novel Ensemble Fuzzy and DL based Approach with Efficient Feature Selection and Extraction Models
Potu Bharath,Dasari Venkata Lakshmi
#Sentiment analysis
#deep convolutional fuzzy neural network
#multilayer stacked bidirectional LSTM neural network inception-ResNet-V2
#enhanced reptile search algorithm
#Al-Biruni earth radius optimization algorithm
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
Real-Time Sign Language Fingerspelling Recognition using Convolutional Neural Network
Abiodun Oguntimilehin,Kolade Balogun
#Communication
#deep learning
#sign language
#hand gesture recognition
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
Linking Palliative Homecare to the Universal Health Coverage Principles and the United Nations Sustainability Development Goals Using the i* Framework’s Strategic and Social Requirements Modelling, Applied to a Cancer Care Organisation
Yousra Odeh,Dina Tbaishat,Faten F. Kharbat,Omar Shamieh,Mohammed Odeh
#Universal health coverage
#UNSDGs
#i* framework
#home health care
#palliative care
#goal-oriented modelling
#social requirements modelling
#cancer care process modelling
#cancer care informatics
#cancer care sociotechnical systems
Generative Adversarial Networks with Data Augmentation and Multiple Penalty Areas for Image Synthesis
Li Chen,Huah Yong Chan
#Generative model
#image synthesis
#data augmentation
Improvement in Rebalanced CRT RSA Seema Verma and Deepak Garg
saving. This paper concentrates on the performance improvement. Rebalanced RSA is designed to improve the decryption
#
Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID
#Low*cost RFID
# cryptography
# protocol
# vulnerabilit y
Prediction of Part of Speech Tags for Punjabi using Support Vector Machines
Abstract:Part-Of-Speech (POS)tagging is a task of assigning the appropriatePOSor lexical category to each word in a
#POS tagging
# SVM
#feature set
#vectorization
#machine learning
# tagger
# punjabi
# indian languages
1
2
3
4
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint