ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: ICA
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Strategic Optimization of Convergence and Energy in Federated Learning Systems
Ghassan Samara,Raed Alazaidah,Ibrahim Obeidat,Mohammad Aljaidi,Mahmoud Odeh,Alaa Elhilo,Sattam Almatarneh,Mo’ath Alluwaici,Essam Aldaoud
#Federated learning
#convergence speed
#energy efficiency
#early stopping
#CO₂ emissions
#hill-climbing
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Archery Human Pose Estimation System Based on DFPDeblur GAN Algorithm
Xiao Yan,Zhuohan Wu,Ting Wang
#Archery sport
#attitude estimation
#DFPDeblur GAN
#HRNet
#deblurring
Enhancing Smart Farming with IoT Sensors Using FRPGW and HALSTM for Accurate Predictions
Fathima ShreneShifna,Baalaji Kadarkarai
#IoT smart farming
#agriculture
#FRPGW
#HALSTM
#ANN
#LSTM
Malware Detection through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
ARCNet: A Novel Deep Learning Model for Robust Solid Waste Image Classification in Waste Management Systems
Velmurugan Lingamuthu,Devaraju Sellappan,Sakthivel Balu,Sheik Mohammed Abdul Raghabu,Aanjankumar Sureshkumar,Prabu Kanna Govindarajan
#Solid waste management
#classification
#ARCNet
#global context attention module
Evaluation of Deep Learning Models for Remote Sensing Segmentation and Classification
SaiVenkataLakshmi Ananth,Suryakanth Gangashetty
#Semantic segmentation
#deep learning
#VGG16
#classification
#remote sensing
#densenet201-CNN
#U-net
#deeplabV3+
Enhancing Motor Imagery EEG Classification Accuracy Using Weight Features Function
Abdel Fateh Doudou,Aicha Reffad,Kamel Mebarkia
#brain-computer interface
#features extraction
#genetic algorithm
#motor imagery
#SVM classifier
Integrating UAV Networks and Edge Computing for Smart Cities: Architecture, Techniques, and Future Trends
Antima Jain,Mohammad Muqeem,Muhammad Uzair,Mohammad Ahmed,Anand Rajawat,Ahmad Khan*,Mohammad Hussain,Mohammad Hussain*,Arshad Ali
#UAVs
#wearble devices
#XAI
#consumer electronics
#personalized health monitoring
#data transparency and ethics
Stimulating the Efficiency of Massive MIMO Cooperative NOMA Applying RIS in 6G Networks
Mohamed Hassan,Khalid Hamid,Elmuntaser Hassan,Imadeldin Elmutasim,Izzeldin Mohamed
#Cooperative NOMA
#massive MIMO
#CR
#RIS
#SE
#millimeter-wave
Triple Transformer Ensemble Fusion Method for Pox Virus Classification
K.P. Haripriya,H. Hannah Inbarani
#Vision transformer
#DEiT
#mobile_ViT transformer
#ensemble methods
#classification
#medical images
Innovative Approach for Brain Tumor Image Classification with Novel Optimized Feedforward Networks
Raafat Munshi
#Brain tumor image classification
#AMFO-FNN
#gaussian filter
#GLCM
#medical imaging
A Novel Risk-Based Testing Framework for Distributed Agile Software Development
Esha Khanna,Rashmi Popli,Naresh Chauhan
#Test case prioritization
#risk-based testing
#distributed agile software development
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera Video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
1
2
3
4
5
6
7
8
9
10
59
60
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint