ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: process
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
Adaptive Red Panda Optimization for Feature Extraction in Diabetic Retinopathy Detection Using Deep Learning
Mahesh Ramakrishnappa,Rohith Shivashankar
#Diabetes
#diabetic retinopathy detection
#convolutional neural network
#U-net
#red panda optimization
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Improving Student Engagement in College Education with Fuzzy Control Algorithm
Yan Chen
#Fuzzy controller
#mamdani fuzzy inference system
#adaptive control
#modified salp swarm
#engagement level
Federated Graph Neural Networks for Dynamic IoT Collaboration Optimization in Smart Home Environments
Cheng Zhang,Yuanquan Zhong
#IoT device collaboration
#graph neural network
#federated learning
#graph structure
#smart home
Bidirectional Circular Shift-Based Reversible Steganography Algorithm with Dual Stego-Images
Mujeebudheen Khan Immamuddinkhan,Siva Sankar Kanahasabapathy
#Data hiding
#multiple stego-image
#PSNR
#bi-directional shift
#stego-image
HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services
Abdelraouf Ishtaiwi,Ahmad Nabot,Omar Alzubi,Awad Ramadan,Abdulbasit Darem,Asma Alhashmi,Mohammad Alauthman,Amjad Aldweesh
#Hybrid concurrency control
#local validation
#global validation
#edge-cloud
An Effective Online Learning Course Recommendation Using Improved Deep Active Convolutional Neural Network Based Sentiment Analysis and Ranking
Roshan Bhanuse,Sandip Mal
#Text pre-processing
#feature extraction
#feature selection
#optimization
#sentiment analysis
#online learning
#recommendation
MXLPred: A Natural Language Processing Deep Learning Model for ICU Patients’ Data
Daphne Samuel,Mary Anita Rajam
#Deep learning
#ensemble model
#natural language processing
#MIMIC-IV
#regression
#big query
Feature Selection Method Based on Consecutive Forward Selection and Backward Elimination Concepts Using a Weighted Vector
Luai Al-Shalabi
#Feature selection
#forward-backward
#chi-square
#classification
1
2
3
4
5
6
7
8
9
10
27
28
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint