ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: BER
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Strategic Optimization of Convergence and Energy in Federated Learning Systems
Ghassan Samara,Raed Alazaidah,Ibrahim Obeidat,Mohammad Aljaidi,Mahmoud Odeh,Alaa Elhilo,Sattam Almatarneh,Mo’ath Alluwaici,Essam Aldaoud
#Federated learning
#convergence speed
#energy efficiency
#early stopping
#CO₂ emissions
#hill-climbing
Malware Detection Through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
A New Data Reduction Technique for Efficient Arabic Data Sentiment Analysis
Remah Younisse,Arafat Awajan,Maram Bani Younes
#Arabic language
#sentiment analysis
#BERT
#data reduction
#TF-IDF
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Improving Student Engagement in College Education with Fuzzy Control Algorithm
Yan Chen
#Fuzzy controller
#mamdani fuzzy inference system
#adaptive control
#modified salp swarm
#engagement level
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Bidirectional Circular Shift-Based Reversible Steganography Algorithm with Dual Stego-Images
Mujeebudheen Khan Immamuddinkhan,Siva Sankar Kanahasabapathy
#Data hiding
#multiple stego-image
#PSNR
#bi-directional shift
#stego-image
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Hybrid FuzzyPCA-VGG16 Framework for Classifying Pox Virus Images
K.P. Haripriya,H. Hannah Inbarani
#Classification
#VGG-16
#PCA
#fuzzy membership function
#CNN
#resnet50
#data augmentation
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
A Machine Learning Attempt for Anatomizing Software Risks in Small and Medium Agile Enterprises
Ayesha Ziana Mohamed,Charles Jebapillai
#Software risk analysis
#software risk classification
#risk prediction
#machine learning
#agile software risk assessment
Hybrid FuzzyPCA-VGG16 Framework for Classifying Pox Virus Images
K.P. Haripriya,H. Hannah Inbarani
#Classification
#VGG-16
#PCA
#fuzzy membership function
#CNN
#resnet50
#data augmentation
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
1
2
3
4
5
6
7
8
9
10
16
17
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint