ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: algorithms
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
MXLPred: A Natural Language Processing Deep Learning Model for ICU Patients’ Data
Daphne Samuel,Mary Anita Rajam
#Deep learning
#ensemble model
#natural language processing
#MIMIC-IV
#regression
#big query
Feature Selection Method Based on Consecutive Forward Selection and Backward Elimination Concepts Using a Weighted Vector
Luai Al-Shalabi
#Feature selection
#forward-backward
#chi-square
#classification
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases
Ayman Mousa,Osama Faragallah,Elsayed Rabaie,Elsayed Nigm
#Database security
#cryptographic algorithms
#datab ase encryption
#Elsayed Rabaie
#Elsayed Nigm
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
Implementation and Comparative Analysis of the Fault Attacks on AES
Saleem Raza,Malik Najmus Saqib,Azfar Shakeel,Majid Iqbal Khan
#Fault attack
#AES
#cryptanalysis
Explore the Relationship between House Prices and Crime Rate in the UK Using Machine Learning Techniques
Soudabeh Motevali,Hamzeh Aljawawdeh,Sami Abuezhayeh,Eman Qaddoumi
#Machine learning techniques
#decision trees
#random forest
#house prices
#crime rates
#house price pre-diction
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal Medical Image Fusion
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Explore the Relationship between House Prices and Crime Rate in the UK Using Machine Learning Techniques
Soudabeh Motevali,Hamzeh Aljawawdeh,Sami Abuezhayeh,Eman Qaddoumi
#Machine learning techniques
#decision trees
#random forest
#house prices
#crime rates
#house price pre-diction
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Symmetric Classes of Series-Parallel Digraphs
Ruzayn Quaddoura
#Digraphs
#series-parallel digraphs
#design and analysis of algorithms
#complexity
Adaptive Software Development: A Comprehensive Framework Integrating Artificial Intelligence for Sustainable Evolution
Yaya Gadjama Soureya,Ngoumou Amougou,Justin Moskolai Ngossaha,Samuel Bowong Tsakou,Marcel Fouda Ndjodo
#Sustainability
#evolution
#quality of service
#SPL
#AI
#IoT
#connected homes
Application Analysis of Multi-Task Learning Algorithm in E-Commerce Personalized Advertising Intelligent Push
Min Hou,Mengze Zhang,Yizhou Zhang
#MTL algorithms
#selling point keywords
#sponsored search
#click through rate
#electronic business
#advertisement
#recommended
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
A Proposed Genetic Algorithm Adaptation Based Model for Students’ Tracks Prediction
Mourad Kaddes,Ayman E. Khedr,Amira M. Idrees
#Genetic algorithms
#optimization
#particle swarm optimization
#education
#student tracks
1
2
3
4
5
6
7
8
9
10
14
15
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint