ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: time
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Turning Point Induced Knowledge Forecasting under Uncertainties (TrIK)
Jagtap Vinyak,Kulkarni Parag,Joshi Pallavi
#Time series forecasting
#shoulder area
#turning point
#knowledge discovery
#surprise
#uncertainty
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Turning Point Induced Knowledge Forecasting under Uncertainties (TrIK)
Jagtap Vinyak,Kulkarni Parag,Joshi Pallavi
#Time series forecasting
#shoulder area
#turning point
#knowledge discovery
#surprise
#uncertainty
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
A Dual-Objective Approach for Allocation of Virtual Machine with improved Job Scheduling in Cloud Computing
Sandeep Sutar,Manjunathswamy Byranahallieraiah,Kumarswamy Shivashankaraiah
#Cloud computing
#job scheduling
#VM scheduling
#cost optimization
#energy utilization
#dual objectives
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN
Reshma Vengaloor,Roopa Muralidhar
#Classification
#defect detection
#deep learning
#FRN structure
#yolov5
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
Mustafa Al-Fayoumi,Qasem Abu Al-Haija,Rakan Armoush,Christine Amareen
#Machine learning
#malicious PDF detection
#feature engineering
#explainable artificial intelligence
#shapley additive explanations
Real-Time Sign Language Fingerspelling Recognition using Convolutional Neural Network
Abiodun Oguntimilehin,Kolade Balogun
#Communication
#deep learning
#sign language
#hand gesture recognition
Image Compression based on Iteration-Free Fractal and using Fuzzy Clustering on DCT Coefficients
Sobia Mahalingam,Valarmathi Lakshapalam,Saranya Ekabaram
#Fractal image compression
#fuzzy clustering
#DCT coefficients
#contractive affine transformation
A New Way of Accelerating Web by Compressing Data with Back Reference-Prefer Geflochtener
Kushwaha Singh,Challa Krishna,and Saini Kumar
#Backward references
#shortest path technique
#HTTP
#iterative compression
#web
#LZSS and LZ77
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
1
2
3
4
5
6
7
8
9
10
15
16
ยป
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint