ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: SW
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Enhanced IIoT Security: A Hybrid Intrusion Detection Framework Using Signature-Based and Deep Learning Approaches
Komal Bansal,Anita Singhrova
#Deep learning
#machine learning
#information security
#anomaly detection
#IIDS
#IIoT
#GRU
#GHA
#SOA
MASNET-ESN: An Effective Deep Learning Based Automatic Medical Image Captioning
V S RATNA KUMARI A,Dr. Lalitha Kumari Pappala
#Medical image
#MASNet
#ESN
#deep learning
#TSA
Deep Learning-Based Degradation Detection and Inpainting of Tamil Nadu Temple Murals Using Transformer Networks and Diffusion Models
Ashwini Ramachandran,Vani Rajamanickam
#Art preservation
#cultural heritage conservation
#historical mural restoration
#degradation detection
#digital inpainting
#swin transformer
#stable diffusion
Binary Border Collie Optimization Algorithm for Feature Selection
Salah Mortada
#Metaheuristic
#classification
#real-world optimization
#reduction
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Vijayanand Radhakrishnan,Ulaganathan Meenakshisundaram,Ganeshkumar Pugalendhi,John Basha
#Packet based attack detection
#Bi-LSTM
#multi-head attention
#NAN communication security
#NS3 simulation
Swin Transformer-Enhanced UAV Surveillance: A Multi-Modal Feature Optimization for High-Precision Road Vehicles Detection
Nouf Abdullah Almujally,Ghulam Mujtaba,Shuaa S. Alharbi,Noif Alshammari,Ahmad Jalal
#Pattern recognition
#traffic management
#YOLOv10
#autonomous vehicles
#intelligent traffic systems
#track former
#deeplabv3+
Binary Border Collie Optimization Algorithm for Feature Selection
Salah Mortada
#Metaheuristic
#classification
#real-world optimization
#reduction
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Vijayanand Radhakrishnan,Ulaganathan Meenakshisundaram,Ganeshkumar Pugalendhi,John Basha
#Packet based attack detection
#Bi-LSTM
#multi-head attention
#NAN communication security
#NS3 simulation
Swin Transformer-Enhanced UAV Surveillance: A Multi-Modal Feature Optimization for High-Precision Road Vehicles Detection
Nouf Abdullah Almujally,Ghulam Mujtaba,Shuaa S. Alharbi,Noif Alshammari,Ahmad Jalal
#Pattern recognition
#traffic management
#YOLOv10
#autonomous vehicles
#intelligent traffic systems
#track former
#deeplabv3+
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Improving Student Engagement in College Education with Fuzzy Control Algorithm
Yan Chen
#Fuzzy controller
#mamdani fuzzy inference system
#adaptive control
#modified salp swarm
#engagement level
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with AlexNet
Muhammad Waqas Ahmed,Abdulwahab Alazeb,Naif Al Mudawi,Touseef Sadiq,Bayan Alabdullah,Hameed ur Rahman,Asaad Algarni,Ahmad Jalal
#Pattern recognition
#alexNet
#fish swarm algorithm
#object detection
Modularization in Dual System and Occupational Self-governance Concerns Employing the Fuzzy Control Algorithm in Vocational Education Personnel Training
Jinyuan Li,Yuqi Cheng
#Fuzzy control
#modularization
#personnel training
#vocational education
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Perception of Natural Scenes: Objects Detection and Segmentations using Saliency Map with
AlexNet, Abdulwahab Alazeb, Naif Al Mudawi, Touseef Sadiq, Bayan Alabdullah, Hameed ur Rahman, Asaad Algarni, Ahmad Jalal
#Pattern recognition
# alexNet
# fish swarm algorithm
# object detection
Modularization in Dual System and Occupational Self-governance Concerns Employing the Fuzzy Control Algorithm in Vocational Education Personnel Training
Jinyuan Li,Yuqi Cheng
#Fuzzy control
#modularization
#personnel training
#vocational education
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Integrating Multiplex Heterogeneous Network for Knowledge Tracing
Liqing Qiu,Si’ao Sun
#Knowledge tracing
#multiplex heterogeneous networks
#graph representation learning
#pre-trained embeddings
#graph convolutional networks
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
1
2
3
4
5
6
7
8
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint