ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Technology
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Smart Agriculture Using Real-Time IoT-LoRa: Wheat Crop Disease Prediction and Irrigation Management Based on Machine Learning Models
Mohamed Sahnoun,Rachida Touhami,Smail Tedjini,Naim Ramou,Redouane Drai,Omar Kherif
#Smart agriculture
#irrigation
#IoT
#LoRa
#crop disease
#deep learning
#machine learning
#fuzzy logic
Constrained Convolutional Neural Network Models for Optimizing Fully Connected Layer Weights in CNNs
Ugur Talas,Burakhan Cubukcu,Ugur Yuzgec
#Artificial intelligence
#image classification
#constrained
#convolutional neural network
#hyperparameter
#deep learning
EEG-Based Epileptic Seizure Detection Using Optimized Spatio-Temporal Graph CNN
Palepu Vijaya Santhi,Sarat K Kotamraju,ChSri Kavya
#Epileptic seizure detection
#holistic dynamic frequency transformer
#wader hunt optimization algorithm
Vehicle Type Recognition using an Efficient Regularization in Mask_RCNN
Noraqilah Misman,Suryanti Awang,Mohammed Khalaf,Hasan Kahtan
#Vehicle type classification
#deep learning
#optimized deep learning
#computational intelligence
Vehicle Type Recognition using an Efficient Regularization in Mask_RCNN
Noraqilah Misman,Suryanti Awang,Mohammed Khalaf,Hasan Kahtan
#Vehicle type classification
#deep learning
#optimized deep learning
#computational intelligence
Strategic Optimization of Convergence and Energy in Federated Learning Systems
Ghassan Samara,Raed Alazaidah,Ibrahim Obeidat,Mohammad Aljaidi,Mahmoud Odeh,Alaa Elhilo,Sattam Almatarneh,Mo’ath Alluwaici,Essam Aldaoud
#Federated learning
#convergence speed
#energy efficiency
#early stopping
#CO₂ emissions
#hill-climbing
Integrating UAV Networks and Edge Computing for Smart Cities: Architecture, Techniques, and Future Trends
Antima Jain,Mohammad Muqeem,Muhammad Uzair,Mohammad Ahmed,Anand Rajawat,Ahmad Khan*,Mohammad Hussain,Mohammad Hussain*,Arshad Ali
#UAVs
#wearble devices
#XAI
#consumer electronics
#personalized health monitoring
#data transparency and ethics
Stimulating the Efficiency of Massive MIMO Cooperative NOMA Applying RIS in 6G Networks
Mohamed Hassan,Khalid Hamid,Elmuntaser Hassan,Imadeldin Elmutasim,Izzeldin Mohamed
#Cooperative NOMA
#massive MIMO
#CR
#RIS
#SE
#millimeter-wave
Strategic Optimization of Convergence and Energy in Federated Learning Systems
Ghassan Samara,Raed Alazaidah,Ibrahim Obeidat,Mohammad Aljaidi,Mahmoud Odeh,Alaa Elhilo,Sattam Almatarneh,Mo’ath Alluwaici,Essam Aldaoud
#Federated learning
#convergence speed
#energy efficiency
#early stopping
#CO₂ emissions
#hill-climbing
Integrating UAV Networks and Edge Computing for Smart Cities: Architecture, Techniques, and Future Trends
Antima Jain,Mohammad Muqeem,Muhammad Uzair,Mohammad Ahmed,Anand Rajawat,Ahmad Khan*,Mohammad Hussain,Mohammad Hussain*,Arshad Ali
#UAVs
#wearble devices
#XAI
#consumer electronics
#personalized health monitoring
#data transparency and ethics
Stimulating the Efficiency of Massive MIMO Cooperative NOMA Applying RIS in 6G Networks
Mohamed Hassan,Khalid Hamid,Elmuntaser Hassan,Imadeldin Elmutasim,Izzeldin Mohamed
#Cooperative NOMA
#massive MIMO
#CR
#RIS
#SE
#millimeter-wave
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Exploring the Intersection of Information Theory and Machine Learning
Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Mohammad Alia,Khalid Suwais,Sally Almanasra
#Information theory
#machine learning
#entropy
#mutual information
#information bottleneck
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
A Robust Multiwavelet-Based Watermarking Scheme for Copyright Protection of Digital Images using Human Visual System
Padmanabhareddy Vundela,Varadarajan Sourirajan
#Digital watermarking
#copyright protection
#HVS
#robust
#discrete wavelet transform
#GHM multiwavelet transform
#canny edge detection algorithm
#hausdorff distance measure
#correlation coefficient
Symmetric Classes of Series-Parallel Digraphs
Ruzayn Quaddoura
#Digraphs
#series-parallel digraphs
#design and analysis of algorithms
#complexity
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Enterprise Employee Work Behavior Recognition Method Based on Faster Region-Convolutional Neural Network
Lu Zhang
#Enterprise staff
#work behavior identification
#Faster R-CNN
#multi-scale features
#K-means++ algorithm
1
2
3
4
5
6
7
8
9
10
12
13
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint