ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: GA
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Classification
Vivine Nurcahyawati,Zuriani Mustaffa,Mohammed Khalaf
#Lexicon-based
#classification
#customer
#review
#text analysis
Integrating Multiplex Heterogeneous Network for Knowledge Tracing
Liqing Qiu,Si’ao Sun
#Knowledge tracing
#multiplex heterogeneous networks
#graph representation learning
#pre-trained embeddings
#graph convolutional networks
Adaptive Software Development: A Comprehensive Framework Integrating Artificial Intelligence for Sustainable Evolution
Yaya Gadjama Soureya,Ngoumou Amougou,Justin Moskolai Ngossaha,Samuel Bowong Tsakou,Marcel Fouda Ndjodo
#Sustainability
#evolution
#quality of service
#SPL
#AI
#IoT
#connected homes
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
Investigation of Chat GPT’s Impact on Education Using Deep Spectral-Spatial Residual Attention Networks
Walaa Ismail,Howida Youssry
#Chat generative pre-trained transformer
#continuous-discrete derivative-free extended Kalman filter
#deep spectral-spatial residual attention network
#parrot optimization algorithm
#synchro-transient- extraction transform
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Cl
Ghadeer
#Lexicon-based
#classification
#customer
#review
#text analysis
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Classification
Vivine Nurcahyawati,Zuriani Mustaffa,Mohammed Khalaf
#Lexicon-based
#classification
#customer
#review
#text analysis
Integrating Multiplex Heterogeneous Network for Knowledge Tracing
Liqing Qiu,Si’ao Sun
#Knowledge tracing
#multiplex heterogeneous networks
#graph representation learning
#pre-trained embeddings
#graph convolutional networks
Adaptive Software Development: A Comprehensive Framework Integrating Artificial Intelligence for Sustainable Evolution
Yaya Gadjama Soureya,Ngoumou Amougou,Justin Moskolai Ngossaha,Samuel Bowong Tsakou,Marcel Fouda Ndjodo
#Sustainability
#evolution
#quality of service
#SPL
#AI
#IoT
#connected homes
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
AD-DCFP: Anomaly Detection Based on the Distance of Closed Frequent Patterns
Yudong Yin,Kun Wang,Linqiang Deng
#Anomaly detection
#closed frequent patterns
#pattern distance
#vertical-based mining
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Fuzzy Speech Recognition Algorithm Based on Continuous Density Hidden Markov Model and Self Organizing Feature Map
Yanning Zhang,Lei Ma,Yunwei Li
#Speech recognition
#wiener filter
#Mel-frequency cepstrum coefficient
#continuous hidden Markov model
#self-organizing feature neural network
1
2
3
4
5
6
7
8
9
10
32
33
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint