ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: RSA
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang,Yuanxi Wang
#CNN
#GAN
#hydrogen gas
#sensors
#fault
#pattern recognition
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
Real-Time Sign Language Fingerspelling Recognition using Convolutional Neural Network
Abiodun Oguntimilehin,Kolade Balogun
#Communication
#deep learning
#sign language
#hand gesture recognition
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
Linking Palliative Homecare to the Universal Health Coverage Principles and the United Nations Sustainability Development Goals Using the i* Framework’s Strategic and Social Requirements Modelling, Applied to a Cancer Care Organisation
Yousra Odeh,Dina Tbaishat,Faten F. Kharbat,Omar Shamieh,Mohammed Odeh
#Universal health coverage
#UNSDGs
#i* framework
#home health care
#palliative care
#goal-oriented modelling
#social requirements modelling
#cancer care process modelling
#cancer care informatics
#cancer care sociotechnical systems
Generative Adversarial Networks with Data Augmentation and Multiple Penalty Areas for Image Synthesis
Li Chen,Huah Yong Chan
#Generative model
#image synthesis
#data augmentation
Improvement in Rebalanced CRT RSA Seema Verma and Deepak Garg
saving. This paper concentrates on the performance improvement. Rebalanced RSA is designed to improve the decryption
#
Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID
#Low*cost RFID
# cryptography
# protocol
# vulnerabilit y
Prediction of Part of Speech Tags for Punjabi using Support Vector Machines
Abstract:Part-Of-Speech (POS)tagging is a task of assigning the appropriatePOSor lexical category to each word in a
#POS tagging
# SVM
#feature set
#vectorization
#machine learning
# tagger
# punjabi
# indian languages
Parallel Particle Filters for Multiple Target Tracking
Abstract:TheMultiple Targets Tracking(MTT) problem is addressed in signal and image processing.When thestate and
#MMapproach
#MTT
# particle filtering
An Efficient Approach for Mining Frequent Item
1Division of Data Science, Ton Duc Thang University, Vietnam 2Faculty of Information Technology, Ton Duc Thang University, Vietnam 3Faculty of Technology, Pacific Ocean University, Vietnam 4Department of Computer Science and Information Engineering,
#Data mining
# frequent item sets
# incremental mining
# pre-large item sets
# item set-tidset tree
Securing RSA Algorithm against Timing Attack
Department of Information Technology, Alpha College of Engineering and Technology, India
#
93
Abdullah Aljumah and Mohammad Siddiqui
#
Curve Cryptography and its Variants
#
Incompatibility Dimensions and Integration of Atomic Commit Protocols
Abstract: Advanced software application systems contain transactions that tend to traverse incompatible database sites
#Two-phase commit
# voting protocols
# distributed transaction processing
# integrated database systems
# internet transactions
# electronic services and electronic commerce
#ECC
# time stamp
# nonce value
# mathematical model
Scalable Self-Organizing Structured P2P Information Retrieval Model Based
Yaser Al-Lahham and Mohammad Hassan
# Peer-to-peer systems
# information retrieval
# node clustering
# equivalence class
# mapping
# incremental transitivity
1
2
3
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint