ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: degree
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Analytical Model of Many-Core System Using N-Conjugate Shuffle Cluster (NCSC)
Mahmoud Obaid,Allam Abumwais,Suhail Odeh,Mahmoud Aldababsa,Rami Hodrob
#Many-core
#interconnection network
#n-conjugate shuffle
#content addressable memory
#scalability
#reliability
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
Software Component Selection: An Optimized Selection Criterion for Component-based Software Engineering (CBSE)
Ahmad Nabot
#Multi-criteria decision making
#assessment
#evidential reasoning
#software component
#quality criteria
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
Solving QBF with Heuristic Small W orld
Abstract: In this paper, we use gaifman graph to describe the topological structure of the Quantified Boolean Formulae
#QBF
# SW
# search algorithm
# optimization algorithm
Pairwise Sequence Alignment using Bio-Database Compression by Improved Fine Tuned Enhanced Suffix Array
#
RPLB:A Replica Placement Algorithm inData Grid with Load Balancing
Abstract:Data gridisaninfrastructurebuilt based on internetwhichfacilitates sharing and management ofgeographically
#Replicaplacement
# load balancing
#ENU
# data grid
# data replication
An Innovative Two-Stage Fuzzy kNN-DST
1
#
Predicting the Existence of Design Patterns based
3
#
The International Arab Journal of Information Techn ology
in Cloud Computing
#
#
Yassine Benajiba2, Mona Diab2, and Paolo Rosso1 1Natural Language Engineering Laboratory, ELiRF, Uni versidad Politécnica Valencia, Spain
#Arabic natural language processing
# classification
# information extraction
# named entity recognition
#Clustering
# data mining
# dispersion
# multiple datab ases
# stability
1
2
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint