ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: TT
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques
Jamal Hussain Shah,Muhammad Sharif,Mudassar Raza,Aisha Azeem
#Linear
#non/linear
#PCA
#2DPCA
#2DKPCA
#facial feat ures extraction
#face recognition
#survey
Implementation and Comparative Analysis of the Fault Attacks on AES
Saleem Raza,Malik Najmus Saqib,Azfar Shakeel,Majid Iqbal Khan
#Fault attack
#AES
#cryptanalysis
Design and Implementation of a Diacritic Arabic Text-To-Speech System
Aissa Amrouche,Leila Falek,Hocine Teffahi
#Diacritics
#Arabic Language
#Diacritization
#Text-To-Speech
#Speech synthesis
#Unit selection
#Bi-grams model
An Unsupervised Feed Forward Neural Network Method for Efficient Clustering
Roya Asadi,Mitra Asadi,Shokoofeh Asadi
#Artificial neural network
#feed forward neural network
#unsupervised learning
#clustering
#real weight
Human Facial Emotion Recognition using Deep Neural Networks
Benisha S,Mirnalinee TT
#Neural Network
#deep neural networks
#facial expression
#emotion recognition system
A Qualitative Approach to the Identification, Visualisation and Interpretation of Repetitive
1
#MPO
# QTC
# similarity analysis
# repetitive motion pa tterns
# continuous triangular model
211
Rangan Kodandaram, Shashank Mallikarjun, Manikantan Krishnamuthan, and Ramachandran Sivan
# FR
# feature extraction
# discrete wavelet transform
# DCT
# feature selection
# BPSO
A Region Adaptive Robust Watermarking Scheme
Motilal Nehru National Institute of Technology, Ind ia
#
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
Abstract: In this paper, we propose to design a cross-layer b ased intrusion detection technique for wireless networks. In this
# Intrusion detection
# wireless networks
# RSS
# cross layer
# RTS-CTS handshake
# TT
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
Abstract: In this paper, we propose to design a cross-layer b ased intrusion detection technique for wireless networks. In this
# Intrusion detection
# wireless networks
# RSS
# cross layer
# RTS-CTS handshake
# TT
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint