ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: OLS
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
GNN-DQL-Based Chronic Kidney Disease Classification Using GFR in the Internet of Medical Things Environment
Bhavani Tatiparti,Vydeki Dharmar
#Deep learning
#neural network
#Q-learning
#glomerular filtration rate
#mayfly optimization
#optimal features
#parameter optimization
#AMO
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
An Improved Q-Learning Algorithm Integrated into the Aloha Anti-Collision Protocol for Energy-Efficient RFID Systems
Van-Hoa Le,Duc-Nhat-Quang Nguyen,Viet-Minh-Nhat Vo
#RFID system
#aloha protocol
#anti-collision
#Q-learning
#energy-efficiency
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
Inventory Optimization Using Data Science Technologies for Supply Chain 4.0
Emna Bouazizi,Ayman Khedr,Sherin Elfaioumy,Mohamed Belal
#Supply chain 4.0
#inventory management
#regression algorithm
#optimization
Using Deep Learning for Profitable Concrete Forecasting Methods
Ayat Al-Hinawi,Radwan Alelaimat
#Concrete performance prediction
#machine learning
#deep learning
#construction management
#regression
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools
Akshay Mudgal,Shaveta Bhatia
#Big data
#data streaming
#real time stream processing
Digital Forensics Techniques and Trends: A Review
Himanshu Dubey,Shobha Bhatt,Lokesh Negi
#Digital forensics
#digital evidence
#digital investigation model
#digital forensic tool
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
An Adaptive Traffic Lights System using Machine Learning
Mohammad Ashraf Ottom,Ahmad Al-Omari
#Traffic time management
#image processing and objects detection
#vehicles dataset
Lightweight Anti-Censorship Online Network for
Division of Electronic and Information Engineering, Chonbuk National University, Republic of Korea
#
Exploring the Potential of Schemes in Building NLP
LaTICE Laboratory, Faculty of Sciences of Monastir, Tunisia
#
1
2
3
4
5
6
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint