ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: key
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Application of Fuzzy Decision Intelligent Recommendation System in Personalized Health Management of Hospitals
Yaping Ge,Kun Hu*,Yi Liu,Chen Zhang
#Intelligent system
#healthcare recommendation system
#decision support system
#fuzzy neural network
#multi-criteria decision making
Swin Transformer-Enhanced UAV Surveillance: A Multi-Modal Feature Optimization for High-Precision Road Vehicles Detection
Nouf Abdullah Almujally,Ghulam Mujtaba,Shuaa S. Alharbi,Noif Alshammari,Ahmad Jalal
#Pattern recognition
#traffic management
#YOLOv10
#autonomous vehicles
#intelligent traffic systems
#track former
#deeplabv3+
Automatic Pronunciation Calibration Method of Language Resource Base Based on Dynamic Time Rounding Algorithm
Shao Gong,Heng Xiao
#Dynamic time rounding
#voice interaction
#semantics
#language resource library
#pronunciation
#detection model
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Archery Human Pose Estimation System Based on DFPDeblur GAN Algorithm
Xiao Yan,Zhuohan Wu,Ting Wang
#Archery sport
#attitude estimation
#DFPDeblur GAN
#HRNet
#deblurring
Triple Transformer Ensemble Fusion Method for Pox Virus Classification
K.P. Haripriya,H. Hannah Inbarani
#Vision transformer
#DEiT
#mobile_ViT transformer
#ensemble methods
#classification
#medical images
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Archery Human Pose Estimation System Based on DFPDeblur GAN Algorithm
Xiao Yan,Zhuohan Wu,Ting Wang
#Archery sport
#attitude estimation
#DFPDeblur GAN
#HRNet
#deblurring
Triple Transformer Ensemble Fusion Method for Pox Virus Classification
K.P. Haripriya,H. Hannah Inbarani
#Vision transformer
#DEiT
#mobile_ViT transformer
#ensemble methods
#classification
#medical images
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera Video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Sales Forecasting and Consumption Recommendation System of E-commerce Agricultural Products Based on LSTM Model
Jianwei Wu
#LSTM model
#sales forecast of agricultural products
#e-commerce
#personalized recommendation system
A Robust Multiwavelet-Based Watermarking Scheme for Copyright Protection of Digital Images using Human Visual System
Padmanabhareddy Vundela,Varadarajan Sourirajan
#Digital watermarking
#copyright protection
#HVS
#robust
#discrete wavelet transform
#GHM multiwavelet transform
#canny edge detection algorithm
#hausdorff distance measure
#correlation coefficient
1
2
3
4
5
6
7
8
9
10
11
ยป
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint