ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: SU
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
Establishing Cause-Effect Relationships from Medical Treatment Data in Intensive Care Unit Settings
Mohammed Abebe Yimer,Özlem Aktaş,Süleyman Sevinç,Ali Rıza Şişman
#Capture variances
#cause-effect relationships
#causal inference
#decision making
#principal component analysis
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
Design and Study of Zombie Enterprise Classification and Recognition Systems Based on Ensemble Learning
Shutong Pang,Ziwei Yang,Chengyou Cai,Zhimin Li
#Integrated learning
#corporate portrait
#classification and identification
#strong supervision model
A Robot Path Planning Method Based on Synergy Behavior of Cockroach Colony
Le Cheng,Lyu Chang,Yanhong Song,Haibo Wang,Yuetang Bian
#Cooperative learning
#robot path planning
#fibonacci transformation
#controlling parameters
#path compression technique
Hybrid Feature Selection based on BTLBO and RNCA to Diagnose the Breast Cancer
Mohan Allam,Nandhini Malaiyappan
#Hybrid feature selection
#binary teaching learning based optimization
#neighborhood component analysis
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
A Modified Technique of Hybrid Multiobjective Genetic Algorithm for Image Fusion
Jyoti Kulkarni,Rajankumar Bichkar
#Genetic algorithm
#hybrid multiobjective genetic algorithm
#image fusion
Performance Comparison of Multiple ANN Optimizer on IoT-enabled Sensor Fire Dataset
Sudip Suklabaidya,Indrani Das
#Sensor dataset
#fire detection
#ANN
#SGD
#adam
#adamax
Application of Intelligent Adaptive Neuro Fuzzy Method for Reusability of Component Based Software System
Jyoti Agarwal,Manoj Kumar,Mugdha Sharma,Deepak Verma,Richa Sharma
#Component
#reusability
#software
#fuzzy
#ANFIS
#interface complexity
#understandability
#customizability
#reliability
Optimization of Quadrotor Route Planning with Time and Energy Priority in Windy Environments
Hayri İncekara,Murat Selek,Fatih Basciftci
#Unmanned aerial vehicles
#quadrotors
#quadrotor route planning
#windy environments
#optimization
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
An On-Site Electronic Voting System Using Blockchain and Biometrics
Shu-Fen Tu,Ching-Sheng Hsu,Bo-Long You
#Blockchain
#biometric
#distributed ledger
#e-voting
Focused Crawler Based on Reinforcement Learning and Decaying Epsilon-Greedy Exploration Policy
Parisa Begum Kaleel,Shina Sheen
#Focused web crawling
#infertility
#information retrieval
#reinforcement learning
Spatial and Semantic Information Enhancement for Indoor 3D Object Detection
Chunmei Chen,Zhiqiang Liang,Haitao Liu,Xin Liu
#3D object detection
#edge convolution
#attention mechanism
#spatial information
#semantic information
Linking Palliative Homecare to the Universal Health Coverage Principles and the United Nations Sustainability Development Goals Using the i* Framework’s Strategic and Social Requirements Modelling, Applied to a Cancer Care Organisation
Yousra Odeh,Dina Tbaishat,Faten F. Kharbat,Omar Shamieh,Mohammed Odeh
#Universal health coverage
#UNSDGs
#i* framework
#home health care
#palliative care
#goal-oriented modelling
#social requirements modelling
#cancer care process modelling
#cancer care informatics
#cancer care sociotechnical systems
A Comparative Study on Deep Learning and Machine Learning Models for Human Action Recognition in Aerial Videos
Surbhi Kapoor,Akashdeep Sharma,Amandeep Verma,Vishal Dhull,Chahat Goyal
#Human action recognition
#openpose
#unmanned aerial vehicle
#kNN
#decision trees
#random forests
#SVM
#multilayer perceptron
#LSTM
Genetic Algorithm with Random and Memory Immigrant Strategies for Solving Dynamic Load Balanced Clustering Problem in Wireless Sensor Networks
Mohaideen Pitchai
#Wireless sensor networks
#genetic algorithm
#load balanced clustering
#random immigrants
#memory immigrants
A Novel Codebook Generation by Smart Fruit Fly Algorithm based on Exponential Flight
Ilker Kilic
#Metaheuristic optimization technique
#fruit fly algorithm
#image compression
#codebook generation
Spatial Pyramid Pooling and Adaptively Feature Fusion based Yolov3 for Traffic Sign Detection
Shimin Xiong,Bin Li,Shiao Zhu,Dongfei Cui,Xiaonan Song
#Traffic sign detection
#yolov3
#spatial pyramid pooling
#adaptively spatial feature fusion
1
2
3
4
5
6
7
8
9
10
53
54
»
All Rights reserved to IAJIT 2023
Powered by:
TurnPoint