ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: MAS
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Saliency Detection for Content Aware Computer Vision Applications
Manipoonchelvi Pandivalavan,Muneeswaran Karuppiah
#Content aware processing
#saliency detection
#computational visual attention
Evolutionary Computing Model for Finding Breast Cancer Masses using Image Enhancement Procedures with Artificial Intelligent Algorithms
Dhivya Samraj,Kuppuchamy Ramasamy,Muralidharan Karuppusamy
#Image enhancement
#breast cancer
#histogram equalization
#particle swarm optimization
#analysis
Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions
Nura Shifa Musa,Nada Masood Mirza,Adnan Ali
#Digital forensic
#internet of things
#internet of things forensics
#forensic investigation process
#challenges
#emerging solutions
A Topic-Specific Web Crawler using Deep Convolutional Networks
Saed ALqaraleh,Hatice Meltem Nergız Sırın
#CNN
#natural language processing
#text classification
#topic specific crawler
#focused crawler
#web crawling
Qaisar Abbas1, Irene Fondo´n2, and Emre Celebi3 1College of Computer and Information Sciences, Al Im am Mohammad Ibn Saud Islamic University,
#
Privacy-Preserving Data Mining in Homogeneous
Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#
Adaptive Semantic Indexing of Documents for Locating Relevant Information in P2P Networks
Abstract: Locating relevant information in Peer#to#Peer (P2P) system is a challenging problem. Conventional approaches use
#
Unconstraint Assignment Problem: A Molecular Computing Approach Ibrahim Zuwairie1&2, Tsuboi Yusei2, Ono Osamu2, and Khalid Marzuki3
Abstract:Deoxyribonucleic Acid or DNA-based computing is an emerging field that bridging the gap between chemistry,
#DNA computing
# assignment problem
# optimization
1
# Medical picture
# enterprise memory
# cases base res earch
# NIFD operator
# edge detection
# newton interpolation
# fractional differentiation
Efficient Algorithm for Contrast Enhancement of Natural Images
1
# Contrast enhancement
# modified sigmoid function
# im age processing
# histogram equalization
The Evaluation of Spoken Dialog Management
Rytis Maskeliunas
#Spoken dialog
# dialog management
# HCI
# speech recognition
# multimodal interactions
Jean De Dieu Nkapkop1,2, Joseph Effa1, Monica Borda2, Laurent Bitjoka3, and Alidou Mohamadou4
#Fast and secure encryption
# chaotic sequence
# linear diophantine equation
# NIST test
A new Model of Multi-Key Generation for RFID Access Control System
handling modern security threats, with access decisions influenced by several factors, including situational, environmental
#Encryption key generation model
# Risk-based access control
# Radio frequency identification
A Quality-Aware Context Information Selection Based Fuzzy Logic in IoT Environment
Things (IoT). An important issue in such systems is faced by context data distribution with a sufficient level of quality i.e.,
#IoT
# context manager
# MDA
# fuzzy logic
# QoC
# context source
# map reduce skyline
# application
Vision-Based Human Activity Recognition Using LDCRFs
flow is proposed. The first phase of this approach is to employ the modelling background that uses an adaptive Gaussian
#Action recognition
# Invariant elliptic fourier
# Invariant zernike moments
# latent-dynamic conditional random fields
1
2
3
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint