ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Systems
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Simultaneously Identifying Opinion Targets and Opinion-bearing Words Based on Multi-Features in Chinese Micro-Blog Texts
Quanchao Liu,Heyan Huang,Chong Feng
#Opinion mining
#opinion target identification
#micro-blog
#feature-opinion pairs
#sentiment polarity
Saliency Detection for Content Aware Computer Vision Applications
Manipoonchelvi Pandivalavan,Muneeswaran Karuppiah
#Content aware processing
#saliency detection
#computational visual attention
Muzzle Classification Using Neural Networks
Ibrahim El-Henawy, Hazem El-bakry, and Hagar El-Hadad
#Muzzle classification
#image processing
#neural networks
A Probabilistic Approach to Building Defect Prediction Model for Platform-based Product Lines
Changkyun Jeon,Neunghoe Kim,Hoh In
#Defect prediction
#defect life cycle
#markov chain
#product line engineering
#software engineering
A Novel Resource Scheduler for Resource Allocation and Scheduling in Big Data Using Hybrid Optimization Algorithm at Cloud Environment
Aarthee Selvaraj,Prabakaran Rajendran,Kanimozhi Rajangam
#Resource management
#particle swarm optimization
#computer performance
#data analysis
#virtualization
Induction of Co-existing Items Available in Distributed Version Control Systems for Software Development
Sibel Özyer
#Version control systems
#requirement analysis
#co-occurrence analysis
#natural language processing
Computational Intelligence Based Point of Interest Detection by Video Surveillance Implementations
Emre Tercan,Serkan Tapkın,Furkan Küçük,Ali Demirtaş,Ahmet Özbayoğlu,Abdussamet Türker
#Point of interest detection
#YOLO algorithm
#R-CNN
#TOOD
#deep learning
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
Design and Study of Zombie Enterprise Classification and Recognition Systems Based on Ensemble Learning
Shutong Pang,Ziwei Yang,Chengyou Cai,Zhimin Li
#Integrated learning
#corporate portrait
#classification and identification
#strong supervision model
An On-Site Electronic Voting System Using Blockchain and Biometrics
Shu-Fen Tu,Ching-Sheng Hsu,Bo-Long You
#Blockchain
#biometric
#distributed ledger
#e-voting
Linking Palliative Homecare to the Universal Health Coverage Principles and the United Nations Sustainability Development Goals Using the i* Framework’s Strategic and Social Requirements Modelling, Applied to a Cancer Care Organisation
Yousra Odeh,Dina Tbaishat,Faten F. Kharbat,Omar Shamieh,Mohammed Odeh
#Universal health coverage
#UNSDGs
#i* framework
#home health care
#palliative care
#goal-oriented modelling
#social requirements modelling
#cancer care process modelling
#cancer care informatics
#cancer care sociotechnical systems
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
BPTI: Bilingual Printed Text Images Dataset for Recognition Purposes
Mohammad Yahia,Husni Al-Muhtaseb
#Optical character recognition
#text images dataset
#HMM
IoT Based Technique for Network Packet Analyzer
Nouh Alhindawi
#Internet of things
#packet analyzers
#networks monitoring
#cloud processing
1
2
3
4
5
6
7
8
9
10
14
15
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint