ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Research
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Adaptive Software Development: A Comprehensive Framework Integrating Artificial Intelligence for Sustainable Evolution
Yaya Gadjama Soureya,Ngoumou Amougou,Justin Moskolai Ngossaha,Samuel Bowong Tsakou,Marcel Fouda Ndjodo
#Sustainability
#evolution
#quality of service
#SPL
#AI
#IoT
#connected homes
Leveraging Chicken Swarm Algorithm for Feature Selection Optimization Targeting Efficient Patients Backlog Elimination
Emna Bouazizi,Ayman E. Khedr,Amira M. Idrees
#Optimization
#chicken swarm optimization algorithm
#feature selection
#logistics
#supply chain management
#backlogs
A Proposed Genetic Algorithm Adaptation Based Model for Students’ Tracks Prediction
Mourad Kaddes,Ayman E. Khedr,Amira M. Idrees
#Genetic algorithms
#optimization
#particle swarm optimization
#education
#student tracks
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose and Esophagus Studies
Muhammad Siddiqi,Yousef Alhwaiti,Said Elaiwat,Marwan Abu-Zanona
#Computer vision
#image morphing
#warping
#face matching
#forward algorithm
#backward algorithm
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
FPGA based Flexible Implementation of Light Weight Inference on Deep Convolutional Neural Networks
Shefa Dawwd
#Standard convolution
#depthwise separable convolution
#inference
#deep convolutional neural networks
#FPGA
Narwhal Optimizer: A Novel Nature-Inspired Metaheuristic Algorithm
Seyyid Ahmed Medjahed,Fatima Boukhatem
#Narwhal optimizer
#meta-heuristic
#optimization
#nature-inspired algorithms
#swarm intelligence
Heart Disease Diagnosis Using Decision Trees with Feature Selection Method
Alaa Sheta,Walaa El-Ashmawi,Abdelkarim Baareh
#Machine learning
#classification
#decision tree
#heart disease
#diagnosis
Determining PolyCystic Ovarian Syndrome Severity from Reddit Posts using Topic Modelling and Association Rule Mining
Santhi Selvaraj,Selva Nidhyananthan Sundaradhas
#Association rule mining
#bag of words
#frequent symptoms set
#PCOS
#topic modelling
Ar-CM-ViMETA: Arabic Image Captioning based on Concept Model and Vision-based Multi-Encoder Transformer Architecture
Asmaa Osman,Mohamed Shalaby,Mona Soliman,Khaled Elsayed
#Arabic image captioning
#transformer
#concept
#computer vision
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction
#Stock price prediction
#machine learning
#synthetic data generation
Research on the Innovation of College English Teaching Mode from the Perspective of VR/AR Technology
Hui Jiang
#VR/AR technology
#college English
#teaching mode
#innovation
Hierarchical Method for Automated Text Documents Classification
Mohamed H. Mousa,Ayman E. Khedr,Amira M. Idrees
#Classification
#knowledge discovery
#text mining
#feature selection
#TF-IDF
#natural language processing
#hierarchical based
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
Insights into Automated Attractiveness Evaluation from 2D Facial Images: A Comprehensive Review
Ali Ibrahem,Jwan Saeed,Adnan Abdulazeez
#Facial beauty prediction
#facial attractiveness assessment
#beauty hypotheses
#beauty computation model
Research on Modelling Capability of English Multimodal File Search based on Transformer
Hongjuan Li
#Transformer
#attention mechanism
#multimodal
#English document retrieval
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
A Review of SDLCs for Big Data Analytics Systems in the Context of Very Small Entities Using the ISO/IEC 29110 Standard-Basic Profile
David Montoya-Murillo,Manuel Mora,Sergio Galvan-Cruz,Angel Munoz-Zavala,Francisco Alvarez-Rodriguez
#BDAS
#SDLC
#ISO/IEC-29110-standard for VSEs
#CRISP-DM
#BSPL
#TDSP and DDSL
1
2
3
4
5
6
7
8
9
10
18
19
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint