ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: complexity
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Symmetric Classes of Series-Parallel Digraphs
Ruzayn Quaddoura
#Digraphs
#series-parallel digraphs
#design and analysis of algorithms
#complexity
Leveraging Chicken Swarm Algorithm for Feature Selection Optimization Targeting Efficient Patients Backlog Elimination
Emna Bouazizi,Ayman E. Khedr,Amira M. Idrees
#Optimization
#chicken swarm optimization algorithm
#feature selection
#logistics
#supply chain management
#backlogs
Heart Disease Diagnosis Using Decision Trees with Feature Selection Method
Alaa Sheta,Walaa El-Ashmawi,Abdelkarim Baareh
#Machine learning
#classification
#decision tree
#heart disease
#diagnosis
Empowering Ovarian Cancer Subtype Classification with Parallel Swin Transformers and WSI Imaging
Lubna ALkahla,Jwan Saeed,Maher Hussein
#Ovarian cancer
#Swin-transformer
#sub-type classification
#histology image analysis
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
3D VAE Video Prediction Model with Kullback Leibler Loss Enhancement
Zahraa Al Mokhtar,Shefa Dawwd
#3D sampling stage
#kullback leibler loss
#temporal 3D sampling stage
#three dimensional RNN layers
#variational autoencoder
A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
Laid Kenioua,Brahim Lejdel,Mohamed Abdelhamid Nedioui
#Autonomous vehicles
#positioning security
#secure communication
#semi-decentralized collaboration architecture
#edge computing
#data collection
#consensus
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
Analysis of QA System Behavior against Context and Question Changes
Rachid Karra,Abdelali Lasfar
#Adversarial attacks
#BERT
#data quality
#question answering
#simplification
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
An Unsupervised Feed Forward Neural Network Method for Efficient Clustering
Roya Asadi,Mitra Asadi,Shokoofeh Asadi
#Artificial neural network
#feed forward neural network
#unsupervised learning
#clustering
#real weight
Application of Intelligent Adaptive Neuro Fuzzy Method for Reusability of Component Based Software System
Jyoti Agarwal,Manoj Kumar,Mugdha Sharma,Deepak Verma,Richa Sharma
#Component
#reusability
#software
#fuzzy
#ANFIS
#interface complexity
#understandability
#customizability
#reliability
Exact Algorithm for Batch Scheduling on Unrelated Machine
Hemmak Allaoua
#Scheduling
#unrelated machine
#exact method
#parallel machine
#batch scheduling
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
Deep Learning Based Mobilenet and Multi-Head Attention Model for Facial Expression Recognition
Aicha Nouisser,Ramzi Zouari,Monji Kherallah
#Depthwise
#pointwise
#attention
#balanced
#skip connection
#transfer learning
A Hybrid Grey Wolf-Whale Optimization Algorithm for Classification of Corona Virus Genome Sequences using Deep Learning
Muthulakshmi Murugaiah,Murugeswari Ganesan
#Corona virus genome
#deep learning
#feature selection
#GWO
#hybrid optimization
#WOA
Developing a Novel Approach for Content Based
#
Model Based Approach for Content Based Image
1
#
Enhancing Generic Pipeline Model for Code Clone Detection using Divide and Conquer Approach
code clone research focuses on the detection and an alysis of code clones in order to help software developers identify code
# Code clone detection
# divide and conquer approach
# generic pipeline model
Kernel Logistic Regression Algorithm for Large Scale Data Classification
classification problems. However, it is often not f ound in large+scale data classification problems an d this is mainly because it
#
1
2
3
4
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint