ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: trust
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Integrating UAV Networks and Edge Computing for Smart Cities: Architecture, Techniques, and Future Trends
Antima Jain,Mohammad Muqeem,Muhammad Uzair,Mohammad Ahmed,Anand Rajawat,Ahmad Khan*,Mohammad Hussain,Mohammad Hussain*,Arshad Ali
#UAVs
#wearble devices
#XAI
#consumer electronics
#personalized health monitoring
#data transparency and ethics
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
Improved Collaborative Filtering Recommender System Based on Hybrid Similarity Measures
Mohamed Abdi,George Okeyo,Ronald Mwangi
#Recommender systems
#collaborative filtering
#similarity measure
#Adjusted Triangle similarity
#Jaccard similarity
#user rating preference behavior
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Lightweight Anti-Censorship Online Network for
Division of Electronic and Information Engineering, Chonbuk National University, Republic of Korea
#
Design and Construction of Secure Digital Will System
#Will system
# key escrow
# testamentary trust
Hierarchical Based Group Key Transfer for Secure
1Department of Information Science and Technology, A nna University, India
#
Designing a Fuzzy-Logic Based Trust and Reputation Model for Secure Resource
Department of Electronics and Communication Enginee ring, Bannari Amman
#
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
integrity for flexible and traditional remote syste ms. SIMS is not only targeted for Linux, but it can also be used for different
# Data integrity
# tampering
# remote systems
# trustwor thiness
# survivability
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc
Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna
# Shamir’s secret sharing
# DoS
# routing cum forwardin g
# certificate revocation
# certification revival
A Survey: Face Recognition Techniques under Partial Occlusion
Department of Computer Science, COMSATS Institute o f Information Technology, Pakistan
# FR
# part based methods
# feature based methods
# frac tal-based methods
# partial occlusion
# recognition rates
Proficient Decision Making on Virtual Machine Creation in IaaS Cloud Environment
Abstract: Cloud computing is a most fascinated technology that is being utilized by IT companies to reduce their
#IaaS
# VMs
# jordon neural network
# genetic algorithm
# service level agreements
# FLBVC
1
2
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint