ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: evaluation
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Mohammad Alia,Adnan Hnaif,Aseel Alrawashdeh,Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Ahmad AlShanty
#Particle swarm optimization
#discrete wavelet transform
#discrete cosine transform
#denosing network
#additive white gaussian noise
#peak signal-to-noise ratio
#normalized correlation coefficient
Using Deep Learning for Profitable Concrete Forecasting Methods
Ayat Al-Hinawi,Radwan Alelaimat
#Concrete performance prediction
#machine learning
#deep learning
#construction management
#regression
Evaluation of Emission Reduction Performance of Power Enterprises Based on Least Squares Support Vector Machine
Wanqing Zhang,Ruohan Huang,Luwei Ye
#Power generation enterprise
#evaluation indicators
#least squares support vector machine
#Lion swarm optimization algorithm
#chaos theory
Curved Text Detection in Scenic Images via Proposal-Free Panoptic Segmentation and Deep Learning
Prachi Chhabra,Ali Abidi
#Deep learning
#image segmentation
#natural scene images
#multi-oriented text
#curved text detection
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
RSO based Optimization of Random Forest Classifier for Fault Detection and Classification in Photovoltaic Arrays
Khaled Baradieh,Mohd Zainuri,Mohamed Kamari,Yushaizad Yusof,Huda Abdullah,Mohd Zaman,Mohd Zulkifley
#Classifier
#diagnosis
#fault classification
#fault detection
#machine learning
#optimization
#photovoltaic
#pv
#random forest
Bibliometric Analysis and Systematic Review of Research on Expert Finding: A PRISMA-guided Approach
Xuan-Lam Pham,Thi Thu Le
#Expert finding
#expert finding systems
#bibliometric analysis
#systematic review
#PRISMA methodology
CANBLWO: A Novel Hybrid Approach for Semantic Text Generation
Abhishek Kumar Pandey,Sanjiban Sekhar Roy
#Natural language processing
#natural language generation
#neural network
#convolutional attention network
#whale optimization algorithm
#BERT
#large language model
Analyzing Sentiments using Optimized Novel Ensemble Fuzzy and DL based Approach with Efficient Feature Selection and Extraction Models
Potu Bharath,Dasari Venkata Lakshmi
#Sentiment analysis
#deep convolutional fuzzy neural network
#multilayer stacked bidirectional LSTM neural network inception-ResNet-V2
#enhanced reptile search algorithm
#Al-Biruni earth radius optimization algorithm
Ar-CM-ViMETA: Arabic Image Captioning based on Concept Model and Vision-based Multi-Encoder Transformer Architecture
Asmaa Osman,Mohamed Shalaby,Mona Soliman,Khaled Elsayed
#Arabic image captioning
#transformer
#concept
#computer vision
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
ERDAP: A Novel Method of Event Relation Data Augmentation Based on Relation Prediction
Ruijuan Hu,Haiyan Liu,Wentao Yu
#Relation prediction
#event relation
#data augmentation
#graph convolutional networks
#causality extraction
Evaluation Model of Athletes’ Lower Extremity Training Ability Based on LSTM Algorithm
Yuanyuan Gao,Qiang Qian,Xuefeng Sun,Jiankun An,Yutao Yuan
#Short-term memory network
#athletes
#lower extremity motor ability
#evaluation model
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
1
2
3
4
5
6
7
8
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint