ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: TAG
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Toward
Image Captioning,Najiba Tagougui,Monji Kherallah
#Image captioning
#vision-language models
#multimodal learning
#large language models
An Analytical Model of Many-Core System Using N-Conjugate Shuffle Cluster (NCSC)
Mahmoud Obaid,Allam Abumwais,Suhail Odeh,Mahmoud Aldababsa,Rami Hodrob
#Many-core
#interconnection network
#n-conjugate shuffle
#content addressable memory
#scalability
#reliability
Enhancing Software Development Efficiency Through User Stories Reuse from Application Descriptions
Indra Kharisma Raharjana,Avril Hermawan,Badrus Zaman,Shukor Sanim Mohd Fauzi
#Application description
#requirements reuse
#requirements elicitation
#process innovation
#user story
Toward Human-Level Understanding: A Systematic Review of Vision-Language Models for Image Captioning
Ansar Hani,Najiba Tagougui,Monji Kherallah
#Image captioning
#vision-language models
#multimodal learning
#large language models
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Vijayanand Radhakrishnan,Ulaganathan Meenakshisundaram,Ganeshkumar Pugalendhi,John Basha
#Packet based attack detection
#Bi-LSTM
#multi-head attention
#NAN communication security
#NS3 simulation
A Novel Risk-Based Testing Framework for Distributed Agile Software Development
Esha Khanna,Rashmi Popli,Naresh Chauhan
#Test case prioritization
#risk-based testing
#distributed agile software development
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
A Novel Risk-Based Testing Framework for Distributed Agile Software Development
Esha Khanna,Rashmi Popli,Naresh Chauhan
#Test case prioritization
#risk-based testing
#distributed agile software development
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
1
2
3
4
5
6
7
8
9
10
11
12
ยป
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint