ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: VAD
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Malware Detection through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
Bi-Level Weighted Histogram Equalization for Scalable Brightness Preservation and Contrast Enhancement for Images
Shanmugavadivu Pichai,Balasubramanian Krishnasamy,Somasundaram Karuppanagounder
#Contrast enhancement
#brightness preservation
#hist ogram equalization
#peak signal to noise ratio
#absolute mean brightness error
#structural similarity index matri x
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Classification
Vivine Nurcahyawati,Zuriani Mustaffa,Mohammed Khalaf
#Lexicon-based
#classification
#customer
#review
#text analysis
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Cl
Ghadeer
#Lexicon-based
#classification
#customer
#review
#text analysis
Exceeding Manual Labeling: VADER Lexicon as an Accurate Alternative to Automatic Sentiment Classification
Vivine Nurcahyawati,Zuriani Mustaffa,Mohammed Khalaf
#Lexicon-based
#classification
#customer
#review
#text analysis
# Software tempering
# software reversing
# cryptograph y
# watermarking
# digital rights management
Nagesh Vadaparthi1, Srinivas Yerramalli2, Suresh Penumatsa3, and Sitharama Poosapati4
#
Performance Analysis of Security Requirements
Salini Prabhakaran1 and Kanmani Selvadurai2 1Department of Computer Science and Engineering, Pondicherry Engineering College, India 2Department of Information Technology, Pondicherry Engineering College, India
#Requirements engineering
# security mechanism
# security requirements
# security requirements engineering
# web applications and vulnerabilities
Incorporating Unsupervised Machine Learning
Maragathavalli Palanivel and Kanmani Selvadurai
#Test case selection and prioritization
# group-wise clustering
Unified Inter-Letter Steganographic Algorithm, A Text-based Data Hiding Method
Ahmad Esmaeilkhah1, Changiz Ghobadi1, Javad Nourinia1, and Maryam Majidzadeh2
#Steganography
# UILS
# InLetSteg
# Reverse extraction attack
# Unicode space character
# Inter-letter spacing
In Loco Identity Fraud Detection Model Using Statistical Analysis for Social Networking Sites: A Case Study with Facebook
Shalini Hanok,Shankaraiah
#Continuous authentication
#in loco
#SNS
#identity fraud
#stalkers
Off-Line Signature Confirmation based on Cluster Representations of Geometrical and Statistical
Features through Vector Distance, Neural Network, Suresha Devaraj, Prakash Hebbakavadi, Kyasambally Rajasekhar
#Offline signature confirmation
# k-means clustering
# geometrical feature
# statistical feature
# vector distance
# neural network
# support vector machine
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint