ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: NER
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Strategic Optimization of Convergence and Energy in Federated Learning Systems
Ghassan Samara,Raed Alazaidah,Ibrahim Obeidat,Mohammad Aljaidi,Mahmoud Odeh,Alaa Elhilo,Sattam Almatarneh,Mo’ath Alluwaici,Essam Aldaoud
#Federated learning
#convergence speed
#energy efficiency
#early stopping
#CO₂ emissions
#hill-climbing
Bridging the Gap: Ensemble Learning-Based NLP Framework for AI-Generated Text Identification in Academia
Layth Hazim,Oguz Ata
#Large language models
#AI-generated text
#human-written text
#exploratory data analysis
#NLP
#ensemble learning
Archery Human Pose Estimation System Based on DFPDeblur GAN Algorithm
Xiao Yan,Zhuohan Wu,Ting Wang
#Archery sport
#attitude estimation
#DFPDeblur GAN
#HRNet
#deblurring
Evaluation of Deep Learning Models for Remote Sensing Segmentation and Classification
SaiVenkataLakshmi Ananth,Suryakanth Gangashetty
#Semantic segmentation
#deep learning
#VGG16
#classification
#remote sensing
#densenet201-CNN
#U-net
#deeplabV3+
Integrating UAV Networks and Edge Computing for Smart Cities: Architecture, Techniques, and Future Trends
Antima Jain,Mohammad Muqeem,Muhammad Uzair,Mohammad Ahmed,Anand Rajawat,Ahmad Khan*,Mohammad Hussain,Mohammad Hussain*,Arshad Ali
#UAVs
#wearble devices
#XAI
#consumer electronics
#personalized health monitoring
#data transparency and ethics
Neural Volumetric Representations for Real-Time 3D Scene Reconstruction using Multi-Modal Learning Algorithm
Pidatala Babu,Preeti Jha
#Deepvoxels
#neural rendering technique
#NeRF
#MMLA
Innovative Approach for Brain Tumor Image Classification with Novel Optimized Feedforward Networks
Raafat Munshi
#Brain tumor image classification
#AMFO-FNN
#gaussian filter
#GLCM
#medical imaging
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera Video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
NS-PPO: A Two-Stage Data Resampling Framework for the Initial Phase of Software Defect Prediction
Xiaowei Zhao,Xuanye Wang,Siliang Suo,Lu Lu
#Software defect prediction
#class imbalance
#deep reinforcement learning
Deep Learning-Based Control System for Context-Aware Surveillance Using Skeleton Sequences from IP and Drone Camera video
Vasavi Sanikommu,Sobhana Mummaneni,Novaline Jacob,Emmanuel Sanjay Raj K.C,Bhartendra Kumar,Radha Devi Pullur Variam
#Computer vision
#human activity recognition
#face recognition
#crowd video surveillance
#deep learning
#feature extraction
Transformer-Based Text Summarization: A Deep Learning Approach with Hybrid Optimization
Dabiah Alboaneen
#Deep learning
#text summarization
#transformer
#optimization
#extractive and abstractive
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
1
2
3
4
5
6
7
8
9
10
24
25
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint