ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: BER
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Analytical Model of Many-Core System Using N-Conjugate Shuffle Cluster (NCSC)
Mahmoud Obaid,Allam Abumwais,Suhail Odeh,Mahmoud Aldababsa,Rami Hodrob
#Many-core
#interconnection network
#n-conjugate shuffle
#content addressable memory
#scalability
#reliability
Analyzing Consumer Mindset Metrics in Arabic Dialectical Texts on Social Media Platforms Using Deep Learning
Safa Al-Sarayreh,Mohd Husin,Noor Ibrahim
#Deep learning
#consumer mindset
#arabic dialectical texts
#social media platforms
#consumer behavior
#NLP
Binary Border Collie Optimization Algorithm for Feature Selection
Salah Mortada
#Metaheuristic
#classification
#real-world optimization
#reduction
Hybrid Transformer Framework for Domain Generated Algorithms Detection: A Fusion of Textual and Numeric Features
Suhad Malayshi,Ahmad Hasasneh*
#Domain generated algorithms
#cybersecurity
#hybrid deep learning
#text transformers
#multimodality
#feature importance
An Enhanced 3D Rainy Stereoscopic Video Stabilization Framework by Using Depth Estimation and SA-LMCCA-CNN
Mehala Rajendran,Mahesh Krishnan
#Video stabilization
#3D rainy stereoscopic video
#depth estimation
#hallucination mitigation
#texture mapping
#LKT
#and LPF
An Analytical Model of Many-Core System Using N-Conjugate Shuffle Cluster (NCSC)
Mahmoud Obaid,Allam Abumwais,Suhail Odeh,Mahmoud Aldababsa,Rami Hodrob
#Many-core
#interconnection network
#n-conjugate shuffle
#content addressable memory
#scalability
#reliability
Analyzing Consumer Mindset Metrics in Arabic Dialectical Texts on Social Media Platforms Using Deep Learning
Safa Al-Sarayreh,Mohd Husin,Noor Ibrahim
#Deep learning
#consumer mindset
#arabic dialectical texts
#social media platforms
#consumer behavior
#NLP
Binary Border Collie Optimization Algorithm for Feature Selection
Salah Mortada
#Metaheuristic
#classification
#real-world optimization
#reduction
Hybrid Transformer Framework for Domain Generated Algorithms Detection: A Fusion of Textual and Numeric Features
Suhad Malayshi,Ahmad Hasasneh*
#Domain generated algorithms
#cybersecurity
#hybrid deep learning
#text transformers
#multimodality
#feature importance
An Enhanced 3D Rainy Stereoscopic Video Stabilization Framework by Using Depth Estimation and SA-LMCCA-CNN
Mehala Rajendran,Mahesh Krishnan
#Video stabilization
#3D rainy stereoscopic video
#depth estimation
#hallucination mitigation
#texture mapping
#LKT
#and LPF
Strategic Optimization of Convergence and Energy in Federated Learning Systems
Ghassan Samara,Raed Alazaidah,Ibrahim Obeidat,Mohammad Aljaidi,Mahmoud Odeh,Alaa Elhilo,Sattam Almatarneh,Mo’ath Alluwaici,Essam Aldaoud
#Federated learning
#convergence speed
#energy efficiency
#early stopping
#CO₂ emissions
#hill-climbing
Malware Detection Through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
Strategic Optimization of Convergence and Energy in Federated Learning Systems
Ghassan Samara,Raed Alazaidah,Ibrahim Obeidat,Mohammad Aljaidi,Mahmoud Odeh,Alaa Elhilo,Sattam Almatarneh,Mo’ath Alluwaici,Essam Aldaoud
#Federated learning
#convergence speed
#energy efficiency
#early stopping
#CO₂ emissions
#hill-climbing
Malware Detection Through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
1
2
3
4
5
6
7
8
9
10
17
18
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint