ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: GRI
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Enhancing Smart Farming with IoT Sensors Using FRPGW and HALSTM for Accurate Predictions
Fathima ShreneShifna,Baalaji Kadarkarai
#IoT smart farming
#agriculture
#FRPGW
#HALSTM
#ANN
#LSTM
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Sales Forecasting and Consumption Recommendation System of E-commerce Agricultural Products Based on LSTM Model
Jianwei Wu
#LSTM model
#sales forecast of agricultural products
#e-commerce
#personalized recommendation system
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
Survival Prediction of Children after Bone Marrow Transplant Using Machine Learning Algorithms
Hussam Alawneh,Ahmad Hasasneh
#Bone marrow transplant
#hematopoietic stem cell
#random forest
#bagging
#adaboost
#gradient boost
#decision tree
#XGBoost
Application of Video Game Algorithm Based on Deep Q-Network Learning in Music Rhythm Teaching
Shilian Zhang,Zheng Huang,Yalin Lang
#DQN network learning
#video game algorithms
#the rhythm of music
#teaching practice
HYAQP: A Hybrid Meta-Heuristic Optimization Model for Air Quality Prediction Using Unsupervised Machine Learning Paradigms
Praveena Vasudevan,Chitra Ekambaram
#Meta-heuristic
#unsupervised machine learning
#hybrid optimization
#optimized k-means
#air quality prediction
RSO based Optimization of Random Forest Classifier for Fault Detection and Classification in Photovoltaic Arrays
Khaled Baradieh,Mohd Zainuri,Mohamed Kamari,Yushaizad Yusof,Huda Abdullah,Mohd Zaman,Mohd Zulkifley
#Classifier
#diagnosis
#fault classification
#fault detection
#machine learning
#optimization
#photovoltaic
#pv
#random forest
Hybridized Clustering Algorithm and Ensemble Learning for Monitoring Paddy Crop Growth Analysis
Sathiya Priya.R,Rahamathunnisa.U
#Crop monitoring
#satellite images
#vegetation index
#eigenvector
#eigenvalue
#hybridized clustering algorithm
#ensemble learning
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
1
2
3
4
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint