ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: attention
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
Temporal Residual Network Based Multi-Head Attention Model for Arabic Handwriting Recognition
Ramzi Zouari,Dalila Othmen,Houcine Boubaker,Monji Kherallah
#Beta stroke
#velocity
#residual
#skip connection
#attention
#vanishing gradient
Deep Learning Based Mobilenet and Multi-Head Attention Model for Facial Expression Recognition
Aicha Nouisser,Ramzi Zouari,Monji Kherallah
#Depthwise
#pointwise
#attention
#balanced
#skip connection
#transfer learning
Exploring the Performance of Farasa and CAMeL Taggers for Arabic Dialect Tweets
Aseel Alfaidi,Hajer Alwadei,Areej Alshutayri,Shahd Alahdal
#Dialect arabic tweets
#POS
#POS tagging
#MSA tagger
#farasa tagger
#CAMeL tagger
Incorporating Triple Attention and Multi-scale Pyramid Network for Underwater Image Enhancement
Kaichuan Sun,Yubo Tian
#Underwater image enhancement
#attention mechanism
#multi-scale pyramid network
#encoder-decoder
An Effective Approach to Software Cost Estimation
1
#
Syed Sabir Mohammed1 and Shanmugasundaram Hariharan2 1Faculty in Computer Science and Engineering, Sathya bama University, India
#
Subtraction Detection Techniques
#Hybrid SCM SAC-OCDMA
# subtraction detection techniq ue
# multi access interference
# optical communication system
Yassine Benajiba2, Mona Diab2, and Paolo Rosso1 1Natural Language Engineering Laboratory, ELiRF, Uni versidad Politécnica Valencia, Spain
#Arabic natural language processing
# classification
# information extraction
# named entity recognition
An Empirical Examination of Maturity Model as Measurement of Information Technology
#
Hardware Implementation Low Power High Speed FFT Core
Abstract : In recent times, DSP algorithms have received increased attention due to rapid advancements in multimedia
#
Representing Access Control Policies in Use Cases Khaled Alghathbar
Abstract: Security requirements of a software product need to receive attention throughout its development lifecycle. This
# Access control policies
# security engineering
# use cases
# misuse
# Clustering
# FCM
# Modified FCM
# k)mean clustering
# a ccuracy
# memory usage
# computation time
Service-Oriented Process Modelling for Device Control in Future Networks
Abstract: The recent advancements in the fields of electronics, information and communication technologies have paved a
#Process modelling
# future networks
# device profile
# device control
Features
#Port identification
# deep packet inspection
# netflow flow
# machine learning
Skyline Recommendation in Distributed Networks
Abstract: Skyline recommendation technology has recently received a lot of attention in the database community. However,
#Skyline recommendation
# distributed networks
# map/reduce
# genetic algorithm
Recognition of Handwritten Characters Based on
Appliquées de Lyon, France
#Feature extraction; wavelet transform
# handwritten character recognition; support vector machine; OCR
An Empirical Study to Evaluate the Relationship of Object-Oriented Metrics and Change Proneness
Abstract: Software maintenance deals with changes or modifications which software goes through. Change prediction models
#Change proneness
# empirical validation
# machine learning
# object-oriented and software quality
Using 3D Convolutional Neural Network in Surveillance Videos for Recognizing Human
1Department of Computer Science and Engineering, Adithya Institute of Technology, India 2Department of Information Technology, Woldia University, Ethiopia
#Security surveillance
# convolutional neural networks
# 3D convolution
# feature extraction
# image analysis and action recognition
Automatic Plagiarism Detection Using Similarity Analysis
Department of Computer Science and Engineering, TRP Engineering College, India
#
Representing Access Control Policies in Use Cases Khaled Alghathbar
Abstract: Security requirements of a software product need to receive attention throughout its development lifecycle. This
# Access control policies
# security engineering
# use cases
# misuse
1
2
3
»
All Rights reserved to IAJIT 2023
Powered by:
TurnPoint