ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Approaches
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Federated Graph Neural Networks for Dynamic IoT Collaboration Optimization in Smart Home Environments
Cheng Zhang,Yuanquan Zhong
#IoT device collaboration
#graph neural network
#federated learning
#graph structure
#smart home
An Effective Online Learning Course Recommendation Using Improved Deep Active Convolutional Neural Network Based Sentiment Analysis and Ranking
Roshan Bhanuse,Sandip Mal
#Text pre-processing
#feature extraction
#feature selection
#optimization
#sentiment analysis
#online learning
#recommendation
Hybrid FuzzyPCA-VGG16 Framework for Classifying Pox Virus Images
K.P. Haripriya,H. Hannah Inbarani
#Classification
#VGG-16
#PCA
#fuzzy membership function
#CNN
#resnet50
#data augmentation
Hybrid FuzzyPCA-VGG16 Framework for Classifying Pox Virus Images
K.P. Haripriya,H. Hannah Inbarani
#Classification
#VGG-16
#PCA
#fuzzy membership function
#CNN
#resnet50
#data augmentation
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Investigation of Chat GPT’s Impact on Education Using Deep Spectral-Spatial Residual Attention Networks
Walaa Ismail,Howida Youssry
#Chat generative pre-trained transformer
#continuous-discrete derivative-free extended Kalman filter
#deep spectral-spatial residual attention network
#parrot optimization algorithm
#synchro-transient- extraction transform
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Survival Prediction of Children after Bone Marrow Transplant Using Machine Learning Algorithms
Hussam Alawneh,Ahmad Hasasneh
#Bone marrow transplant
#hematopoietic stem cell
#random forest
#bagging
#adaboost
#gradient boost
#decision tree
#XGBoost
Heart Disease Diagnosis Using Decision Trees with Feature Selection Method
Alaa Sheta,Walaa El-Ashmawi,Abdelkarim Baareh
#Machine learning
#classification
#decision tree
#heart disease
#diagnosis
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
Insights into Automated Attractiveness Evaluation from 2D Facial Images: A Comprehensive Review
Ali Ibrahem,Jwan Saeed,Adnan Abdulazeez
#Facial beauty prediction
#facial attractiveness assessment
#beauty hypotheses
#beauty computation model
Improved Collaborative Filtering Recommender System Based on Hybrid Similarity Measures
Mohamed Abdi,George Okeyo,Ronald Mwangi
#Recommender systems
#collaborative filtering
#similarity measure
#Adjusted Triangle similarity
#Jaccard similarity
#user rating preference behavior
English-Chinese Bilingual Teaching: A DECTMT-NBO-DMSFNN Approach for Design and Application of Machine Translation Technology
Yuwei Wang
#English
#chinese
#translation
#text
#language
#communication
#teaching
#bilingual
#vocabulary
#learning
#phrase
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Review of Agile SDLC for Big Data Analytics Systems in the Context of Small Organizations Using Scrum-XP
Gerardo Salazar-Salazar,Manuel Mora,Hector Duran-Limon,Francisco Alvarez-Rodriguez,Angel Munoz-Zavala
#Big data analytics systems
#agile system development life cycle
#Scrum-XP
#CRISP-DM
#TDSP and DDSL
#small business
Improvement of Translation Accuracy for the Word Sense Disambiguation System using Novel Classifier Approach
Ajith Abraham,Bineet Kumar Gupta,Satya Bhushan Verma,Archana Sachindeo Maurya,Mohammad Husain,Arshad Ali,Sami Alshmrany,Sanjay Gupta
#Bayes theorem
#machine learning
#machine translation
#naïve bayes classification
#supervised approach
#unsupervised approach
#and word sense disambiguation
Effective Test Cases Generation with Harmony Search and RBF Neural Network
Hemant Kumar,Vipin Saxena
#Algorithm optimization
#automated testing
#test cases
#hybrid algorithm and software testing efficiency
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality
Xiang Cheng,Pingping Zhang
#Football
#progressive Wasserstein generative adversarial network
#soccer training termite life cycle optimization
#virtual reality
RSO based Optimization of Random Forest Classifier for Fault Detection and Classification in Photovoltaic Arrays
Khaled Baradieh,Mohd Zainuri,Mohamed Kamari,Yushaizad Yusof,Huda Abdullah,Mohd Zaman,Mohd Zulkifley
#Classifier
#diagnosis
#fault classification
#fault detection
#machine learning
#optimization
#photovoltaic
#pv
#random forest
1
2
3
4
5
6
7
8
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint