ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: SR
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Improving Student Engagement in College Education with Fuzzy Control Algorithm
Yan Chen
#Fuzzy controller
#mamdani fuzzy inference system
#adaptive control
#modified salp swarm
#engagement level
Enhanced Nucleus Segmentation with Sobel Edge Detection and Attention Gate with Modified UNET
Sravanthi Jakkula,Raju Bhukya
#UNET
#nucleus segmentation
#sobel filter
Interactive Query Expansion using Concept-Based Directions Finder Based on Wikipedia
Yuvarani Meiyappan,Sriman Narayana Iyengar
#Interactive query expansion
#term suggestion
#direc tion finder
#term extractor
#web search
#Wikipedia
A Two-Stage Method of Cervical Cancer Detection using Hybrid Classification Methods
Orasa Patsadu,Srisuda Soranunsri,Chananate Arthayukti
#Cervical cancer
#hybrid classification methods
#two stage classification
#machine learning
#healthcare
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
A Two-Stage Method of Cervical Cancer Detection using Hybrid Classification Methods
Orasa Patsadu,Srisuda Soranunsri,Chananate Arthayukti
#Cervical cancer
#hybrid classification methods
#two stage classification
#machine learning
#healthcare
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Investigation of Chat GPT’s Impact on Education Using Deep Spectral-Spatial Residual Attention Networks
Walaa Ismail,Howida Youssry
#Chat generative pre-trained transformer
#continuous-discrete derivative-free extended Kalman filter
#deep spectral-spatial residual attention network
#parrot optimization algorithm
#synchro-transient- extraction transform
Application of Video Game Algorithm Based on Deep Q-Network Learning in Music Rhythm Teaching
Shilian Zhang,Zheng Huang,Yalin Lang
#DQN network learning
#video game algorithms
#the rhythm of music
#teaching practice
Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Mohammad Alia,Adnan Hnaif,Aseel Alrawashdeh,Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Ahmad AlShanty
#Particle swarm optimization
#discrete wavelet transform
#discrete cosine transform
#denosing network
#additive white gaussian noise
#peak signal-to-noise ratio
#normalized correlation coefficient
3D VAE Video Prediction Model with Kullback Leibler Loss Enhancement
Zahraa Al Mokhtar,Shefa Dawwd
#3D sampling stage
#kullback leibler loss
#temporal 3D sampling stage
#three dimensional RNN layers
#variational autoencoder
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
Simultaneously Identifying Opinion Targets and Opinion-bearing Words Based on Multi-Features in Chinese Micro-Blog Texts
Quanchao Liu,Heyan Huang,Chong Feng
#Opinion mining
#opinion target identification
#micro-blog
#feature-opinion pairs
#sentiment polarity
A New (k, n) Secret Image Sharing Scheme (SISS)
Amitava Nag,Sushanta Biswas,Debasree Sarkar,Partha Sarkar
#complete graph
#spanning tree
#Prüfer sequence
#(k
# n) threshold secret image sharing
1
2
3
4
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint