ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: MAI
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Malware Detection through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Unsupervised Convolutional Autoencoder Framework for Multimodal Medical Image Fusion in Brain Tumour Diagnosis
Saravanan Vijayan,Malarvizhi Subramani
#Unsupervised learning
#autoencoders
#image fusion
#medical images
#brain tumours
Precision Pursuit: A Spectral Decomposition- Driven Adaptive Block Measurement Matrix for
Enhanced Compressive Sensing in Imaging,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Unsupervised Convolutional Autoencoder Framework for Multimodal Medical Image Fusion in Brain Tumour Diagnosis
Saravanan Vijayan,Malarvizhi Subramani
#Unsupervised learning
#autoencoders
#image fusion
#medical images
#brain tumours
Precision Pursuit: A Spectral Decomposition-Driven Adaptive Block Measurement Matrix for Enhanced Compressive Sensing in Imaging
Aarthi Elaveini,Deepa Thangavel
#Hybrid sensing matrix
#sparsity
#recovery algorithm
#OMP
#CoSaMP
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Federated Graph Neural Networks for Dynamic IoT Collaboration Optimization in Smart Home Environments
Cheng Zhang,Yuanquan Zhong
#IoT device collaboration
#graph neural network
#federated learning
#graph structure
#smart home
HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services
Abdelraouf Ishtaiwi,Ahmad Nabot,Omar Alzubi,Awad Ramadan,Abdulbasit Darem,Asma Alhashmi,Mohammad Alauthman,Amjad Aldweesh
#Hybrid concurrency control
#local validation
#global validation
#edge-cloud
MXLPred: A Natural Language Processing Deep Learning Model for ICU Patients’ Data
Daphne Samuel,Mary Anita Rajam
#Deep learning
#ensemble model
#natural language processing
#MIMIC-IV
#regression
#big query
Feature Selection Method Based on Consecutive Forward Selection and Backward Elimination Concepts Using a Weighted Vector
Luai Al-Shalabi
#Feature selection
#forward-backward
#chi-square
#classification
Arabic Language Characteristics that Make its Automatic Processing Challenging
Ilhem Boulesnam,Rabah Boucetti
#Computational linguistics
#natural language processing
#Arabic natural language processing
#Arabic characteristics
#Arabic language automation
A Robust Multiwavelet-Based Watermarking Scheme for Copyright Protection of Digital Images using Human Visual System
Padmanabhareddy Vundela,Varadarajan Sourirajan
#Digital watermarking
#copyright protection
#HVS
#robust
#discrete wavelet transform
#GHM multiwavelet transform
#canny edge detection algorithm
#hausdorff distance measure
#correlation coefficient
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
Interactive Query Expansion using Concept-Based Directions Finder Based on Wikipedia
Yuvarani Meiyappan,Sriman Narayana Iyengar
#Interactive query expansion
#term suggestion
#direc tion finder
#term extractor
#web search
#Wikipedia
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
The Statistical Quantized Histogram Texture Features Analysis for Image Retrieval Based on Median and Laplacian Filters in the DCT Domain
Fazal Malik,Baharum Baharudin
#CBIR
#median filter
#laplacian filter
#statistical texture features
#quantized histograms
#DCT
1
2
3
4
5
6
7
8
9
10
20
21
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint