ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: design
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*
Jing Zhang,Guiyan Wei,Yonggong Ren
#Semi-supervised learning
#clustering
#auto-encoder network
#pair-wise
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
Mustafa Al-Fayoumi,Qasem Abu Al-Haija,Rakan Armoush,Christine Amareen
#Machine learning
#malicious PDF detection
#feature engineering
#explainable artificial intelligence
#shapley additive explanations
Simultaneously Identifying Opinion Targets and Opinion-bearing Words Based on Multi-Features in Chinese Micro-Blog Texts
Quanchao Liu,Heyan Huang,Chong Feng
#Opinion mining
#opinion target identification
#micro-blog
#feature-opinion pairs
#sentiment polarity
Design and Implementation of a Diacritic Arabic Text-To-Speech System
Aissa Amrouche,Leila Falek,Hocine Teffahi
#Diacritics
#Arabic Language
#Diacritization
#Text-To-Speech
#Speech synthesis
#Unit selection
#Bi-grams model
An Efficient Perceptual of CBIR System using MIL-SVM Classification and SURF Feature Extraction
Bhuvana Shanmugam,Radhakrishnan Rathinavel,Tamije Perumal,Subhakala Subbaiyan
#SURF
#MIL-SVM
#LBG
#HI
Smart City Application: Internet of Things (IoT) Technologies Based Smart Waste Collection Using Data Mining Approach and Ant Colony Optimization
Zeki Oralhan,Burcu Oralhan,Yavuz Yiğit
#Ant colony optimization
#data mining
#IoT smart device
#smart city
#smart waste management
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools
Akshay Mudgal,Shaveta Bhatia
#Big data
#data streaming
#real time stream processing
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Design and Study of Zombie Enterprise Classification and Recognition Systems Based on Ensemble Learning
Shutong Pang,Ziwei Yang,Chengyou Cai,Zhimin Li
#Integrated learning
#corporate portrait
#classification and identification
#strong supervision model
A Robot Path Planning Method Based on Synergy Behavior of Cockroach Colony
Le Cheng,Lyu Chang,Yanhong Song,Haibo Wang,Yuetang Bian
#Cooperative learning
#robot path planning
#fibonacci transformation
#controlling parameters
#path compression technique
Performance Comparison of Multiple ANN Optimizer on IoT-enabled Sensor Fire Dataset
Sudip Suklabaidya,Indrani Das
#Sensor dataset
#fire detection
#ANN
#SGD
#adam
#adamax
An On-Site Electronic Voting System Using Blockchain and Biometrics
Shu-Fen Tu,Ching-Sheng Hsu,Bo-Long You
#Blockchain
#biometric
#distributed ledger
#e-voting
Spatial and Semantic Information Enhancement for Indoor 3D Object Detection
Chunmei Chen,Zhiqiang Liang,Haitao Liu,Xin Liu
#3D object detection
#edge convolution
#attention mechanism
#spatial information
#semantic information
Exact Algorithm for Batch Scheduling on Unrelated Machine
Hemmak Allaoua
#Scheduling
#unrelated machine
#exact method
#parallel machine
#batch scheduling
1
2
3
4
5
6
7
8
9
10
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint