ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: evaluation
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs
Abeer Hamed,Alaa Riad,Ramadan Mowad,Hazem El-Bakry
#Analytical hierarchical process
#cost of defects metrics
#cost of software quality metrics
#reliability metrics
#small and medium enterprises
#software quality
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
ERDAP: A Novel Method of Event Relation Data Augmentation Based on Relation Prediction
Ruijuan Hu,Haiyan Liu,Wentao Yu
#Relation prediction
#event relation
#data augmentation
#graph convolutional networks
#causality extraction
Evaluation Model of Athletes’ Lower Extremity Training Ability Based on LSTM Algorithm
Yuanyuan Gao,Qiang Qian,Xuefeng Sun,Jiankun An,Yutao Yuan
#Short-term memory network
#athletes
#lower extremity motor ability
#evaluation model
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Speech Scrambling based on Independent Component Analysis and Particle Swarm Optimization
Nidaa Abbas,Jahanshah Kabudian
#ICA
#itakura-saito distance
#LPC
#PSO
#speech scrambling
#SNR
Design and Implementation of a Diacritic Arabic Text-To-Speech System
Aissa Amrouche,Leila Falek,Hocine Teffahi
#Diacritics
#Arabic Language
#Diacritization
#Text-To-Speech
#Speech synthesis
#Unit selection
#Bi-grams model
Using Machine Learning Techniques for Subjectivity Analysis based on Lexical and Non-lexical Features
Hikmat Ullah Khan,Ali Daud
#Machine Learning
#classification
#opinion mining
#lexicon
#non-lexical features
An Unsupervised Feed Forward Neural Network Method for Efficient Clustering
Roya Asadi,Mitra Asadi,Shokoofeh Asadi
#Artificial neural network
#feed forward neural network
#unsupervised learning
#clustering
#real weight
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
Intelligent Recognition of Gas-Liquid Two-Phase Flow Based on Optical Image
Shujuan Wang,Haofu Guan,Yuqing Wang,Kanghui Zhang,Yuntao Dai,Shouxu Qiao,Jihong Shen
#Optical image
#gas-liquid two-phase flow
#machine vision
#FCN
#U-Net
Generating Embedding Features Using Deep Learning for Ethnics Recognition
Mohammed Alghaili,Zhiyong Li,Ahmed AlBdairi,Malasy Katiyalath
#Computer vision
#machine learning
#ethnics identification
#deep learning
New Model of Feature Selection based Chaotic Firefly Algorithm for Arabic Text Categorization
Meryeme Hadni,Hassane Hjiaj
#Chaotic method
#firefly algorithm
#arabic text categorization
#feature selection
An Adaptive Traffic Lights System using Machine Learning
Mohammad Ashraf Ottom,Ahmad Al-Omari
#Traffic time management
#image processing and objects detection
#vehicles dataset
1
2
3
4
5
6
7
8
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint