ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: RSA
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose and Esophagus Studies
Muhammad Siddiqi,Yousef Alhwaiti,Said Elaiwat,Marwan Abu-Zanona
#Computer vision
#image morphing
#warping
#face matching
#forward algorithm
#backward algorithm
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction
#Stock price prediction
#machine learning
#synthetic data generation
Detecting Spam Reviews in Arabic by Deep Learning
Eman Aljadani,Fatmah Assiri,Areej Alshutayri
#Spam reviews
#spam reviews detection
#arabic language
#deep learning
#convolutional neural network
#bidirectional long short-term memory
Insights into Automated Attractiveness Evaluation from 2D Facial Images: A Comprehensive Review
Ali Ibrahem,Jwan Saeed,Adnan Abdulazeez
#Facial beauty prediction
#facial attractiveness assessment
#beauty hypotheses
#beauty computation model
Cyberbullying Detection in Social Networks Using Deep Learning
Hayel Khafajeh
#Cyberbullying detection
#deep learning
#social networks
#convolutional neural networks
#long short-term memory
#bidirectional encoder representations from transformers
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
An Improved Classification Model for English Syntax Error Correction Design of DL Algorithm
Xue Han
#Universities
#English
#syntax error
#classification model
#neural network
#attention mechanism
Analyzing Sentiments using Optimized Novel Ensemble Fuzzy and DL based Approach with Efficient Feature Selection and Extraction Models
Potu Bharath,Dasari Venkata Lakshmi
#Sentiment analysis
#deep convolutional fuzzy neural network
#multilayer stacked bidirectional LSTM neural network inception-ResNet-V2
#enhanced reptile search algorithm
#Al-Biruni earth radius optimization algorithm
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
Real-Time Sign Language Fingerspelling Recognition using Convolutional Neural Network
Abiodun Oguntimilehin,Kolade Balogun
#Communication
#deep learning
#sign language
#hand gesture recognition
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
1
2
3
4
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint