ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: SR
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Mohammad Alia,Adnan Hnaif,Aseel Alrawashdeh,Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Ahmad AlShanty
#Particle swarm optimization
#discrete wavelet transform
#discrete cosine transform
#denosing network
#additive white gaussian noise
#peak signal-to-noise ratio
#normalized correlation coefficient
3D VAE Video Prediction Model with Kullback Leibler Loss Enhancement
Zahraa Al Mokhtar,Shefa Dawwd
#3D sampling stage
#kullback leibler loss
#temporal 3D sampling stage
#three dimensional RNN layers
#variational autoencoder
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
Simultaneously Identifying Opinion Targets and Opinion-bearing Words Based on Multi-Features in Chinese Micro-Blog Texts
Quanchao Liu,Heyan Huang,Chong Feng
#Opinion mining
#opinion target identification
#micro-blog
#feature-opinion pairs
#sentiment polarity
A New (k, n) Secret Image Sharing Scheme (SISS)
Amitava Nag,Sushanta Biswas,Debasree Sarkar,Partha Sarkar
#complete graph
#spanning tree
#Prüfer sequence
#(k
# n) threshold secret image sharing
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
Linking Palliative Homecare to the Universal Health Coverage Principles and the United Nations Sustainability Development Goals Using the i* Framework’s Strategic and Social Requirements Modelling, Applied to a Cancer Care Organisation
Yousra Odeh,Dina Tbaishat,Faten F. Kharbat,Omar Shamieh,Mohammed Odeh
#Universal health coverage
#UNSDGs
#i* framework
#home health care
#palliative care
#goal-oriented modelling
#social requirements modelling
#cancer care process modelling
#cancer care informatics
#cancer care sociotechnical systems
MIRNA: Adaptive 3D Game to Assist Children's Distance Learning Difficulties; Design and Use
Dheya Mustafa,Intisar Ghazi Mustafa,Samah Zriqat,Qutaibah AlThebyan
#Distance learning
#game engine
#education
#3D graphics
#games for learning
Qaisar Abbas1, Irene Fondo´n2, and Emre Celebi3 1College of Computer and Information Sciences, Al Im am Mohammad Ibn Saud Islamic University,
#
Developing a Novel Approach for Content Based
#
Sri Venkateswara College of Engineering, India
#Image encryption
# modular addition
# chaotic maps
# l ogistic map
# socek
# grp
# cross
# block cipher
RPLB:A Replica Placement Algorithm inData Grid with Load Balancing
Abstract:Data gridisaninfrastructurebuilt based on internetwhichfacilitates sharing and management ofgeographically
#Replicaplacement
# load balancing
#ENU
# data grid
# data replication
Metacognitive Awareness Assessment and Introductory Computer Programming Course
Faculty of Computer Science and Information Technology, University of Malaya, Malaysia
#Noviceprogrammer
#met cognitive
#MAI
#educational psychology
# introductory computer programming
Face Image Super ResolutionviaAdaptive-Block PCA
and Technology University,China
#SR
#face image
# adaptive-block
# PCA
Iris-Pupil Thickness BasedMethod for Determining Age Groupofa Person
Abstract:Soft biometric attributes such asgender,ethnicityand agecan be determinedfrom theirisimages.Pupil size plays
#Irisrecognition
# feature extraction
# iris aging
# iris pupil ratio
New Prototype of Hybrid 3D-Biometric Facial
Haitham Issa1, Sali Issa2, and Mohammad Issa3 1 Department of Communications and Electronics Engin eering, Isra University, Jordan 2, 3Department of Electronics and Information Engineering, Huazhong University of Science and
#
1
2
3
4
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint