ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: application
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Turning Point Induced Knowledge Forecasting under Uncertainties (TrIK)
Jagtap Vinyak,Kulkarni Parag,Joshi Pallavi
#Time series forecasting
#shoulder area
#turning point
#knowledge discovery
#surprise
#uncertainty
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Turning Point Induced Knowledge Forecasting under Uncertainties (TrIK)
Jagtap Vinyak,Kulkarni Parag,Joshi Pallavi
#Time series forecasting
#shoulder area
#turning point
#knowledge discovery
#surprise
#uncertainty
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
Saliency Detection for Content Aware Computer Vision Applications
Manipoonchelvi Pandivalavan,Muneeswaran Karuppiah
#Content aware processing
#saliency detection
#computational visual attention
Pattern Recognition Using the Concept of Disjoint Matrix of MIMO System
Mezbahul Islam,Rahmina Rubaiat,Imdadul Islam,Mostafizur Rahaman,Mohamed Ruhul Amin
#Uncoupled MIMO links
#eigenvalues
#unitary matrix
#noise and channel matrix
Using Machine Learning Techniques for Subjectivity Analysis based on Lexical and Non-lexical Features
Hikmat Ullah Khan,Ali Daud
#Machine Learning
#classification
#opinion mining
#lexicon
#non-lexical features
Smart City Application: Internet of Things (IoT) Technologies Based Smart Waste Collection Using Data Mining Approach and Ant Colony Optimization
Zeki Oralhan,Burcu Oralhan,Yavuz Yiğit
#Ant colony optimization
#data mining
#IoT smart device
#smart city
#smart waste management
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
A Highly Parallelizable Hash Algorithm Based on Latin Cubes
Ming Xu
#Hash algorithm
#latin cubes
#3D attribute
#parallelism
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
Live Virtual Machine Migration in Fog Computing: State of the Art
Shahd Alqam,Nasser Alzeidi,Abderrezak Touzene,Khaled Day
#Live virtual machine migration
#conventional algorithms
#fog computing architecture
#live migration algorithms classification
#artificial intelligence
#framework modeling
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
A Modified Technique of Hybrid Multiobjective Genetic Algorithm for Image Fusion
Jyoti Kulkarni,Rajankumar Bichkar
#Genetic algorithm
#hybrid multiobjective genetic algorithm
#image fusion
Application of Intelligent Adaptive Neuro Fuzzy Method for Reusability of Component Based Software System
Jyoti Agarwal,Manoj Kumar,Mugdha Sharma,Deepak Verma,Richa Sharma
#Component
#reusability
#software
#fuzzy
#ANFIS
#interface complexity
#understandability
#customizability
#reliability
1
2
3
4
5
6
7
8
9
10
14
15
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint