ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: algorithms
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Construction of Educational Resource System Based on Mahout Collaborative Filtering Algorithm
Guiyong Zhu
#Multi-dimensional feature fusion
#collaborative filtering algorithm
#personalized recommendation
#educational resource system
#deep learning
Hybrid Ensemble Based Machine Learning Approach for Cardiovascular Disease Risk Prediction Using Multiple Integrated Datasets
Sravanthi Jakkula,Raju Bhukya
#Cardiovascular diseases
#machine learning algorithms
#stacked models
#disease prediction
Smart Agriculture Using Real-Time IoT-LoRa: Wheat Crop Disease Prediction and Irrigation Management Based on Machine Learning Models
Mohamed Sahnoun,Rachida Touhami,Smail Tedjini,Naim Ramou,Redouane Drai,Omar Kherif
#Smart agriculture
#irrigation
#IoT
#LoRa
#crop disease
#deep learning
#machine learning
#fuzzy logic
Machine and Deep Learning Model for EMG Signal Classification: A New Performance-Cost Analysis Across CPU and GPU Architectures
Toka Fathi,Mohammed A M Abdullah,Basil Shukr
#EMG
#GPU
#decision trees
#random forests
#KNN
#XGboost
#LSTM
#and CNN-LSTM
Inflammatory Bowel Disease Detection Using Machine Learning Techniques
Veerender Aerranagula,Raju Bhukya
#Bowel disease
#crohn’s disease
#machine learning
Hybrid Transformer Framework for Domain Generated Algorithms Detection: A Fusion of Textual and Numeric Features
Suhad Malayshi,Ahmad Hasasneh*
#Domain generated algorithms
#cybersecurity
#hybrid deep learning
#text transformers
#multimodality
#feature importance
Multimodal Human Interaction Recognition Framework Using Multi-Features and Deep Learning Approach
Tanvir Fatima Naik Bukht,Haita Alhaston,Noif Alshamrari,Nouf Abdullah Almujally,Ahmad Jalal
#Image analysis
#pattern analytics
#body pose
#interaction classification
#deep learning
Hybrid Transformer Framework for Domain Generated Algorithms Detection: A Fusion of Textual and Numeric Features
Suhad Malayshi,Ahmad Hasasneh*
#Domain generated algorithms
#cybersecurity
#hybrid deep learning
#text transformers
#multimodality
#feature importance
Multimodal Human Interaction Recognition Framework Using Multi-Features and Deep Learning Approach
Tanvir Fatima Naik Bukht,Haita Alhaston,Noif Alshamrari,Nouf Abdullah Almujally,Ahmad Jalal
#Image analysis
#pattern analytics
#body pose
#interaction classification
#deep learning
Neural Volumetric Representations for Real-Time 3D Scene Reconstruction Using Multi-Modal Learning Algorithm
Pidatala Devendrababu,Preeti Jha
#Deepvoxels
#neural rendering technique
#NeRF
#MMLA
Neural Volumetric Representations for Real-Time 3D Scene Reconstruction Using Multi-Modal
Learning Algorithm,Preeti Jha
#Deepvoxels
#neural rendering technique
#NeRF
#MMLA
Neural Volumetric Representations for Real-Time 3D Scene Reconstruction Using Multi-Modal
Learning Algorithm, Preeti Jha
#Deepvoxels
# neural rendering technique
# NeRF
# MMLA
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Hybrid CNN Xception and Long Short-Term Memory Model for the Detection of Interpersonal Violence in Videos
David Calderon-Vilca,Kent Cuadros-Ramos,Sergio Valcarcel-Ascencios,Igor Aguilar-Alonso
#Image processing
#LSTM
#patterns of violence
#violence detection
#xception
MXLPred: A Natural Language Processing Deep Learning Model for ICU Patients’ Data
Daphne Samuel,Mary Anita Rajam
#Deep learning
#ensemble model
#natural language processing
#MIMIC-IV
#regression
#big query
Feature Selection Method Based on Consecutive Forward Selection and Backward Elimination Concepts Using a Weighted Vector
Luai Al-Shalabi
#Feature selection
#forward-backward
#chi-square
#classification
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases
Ayman Mousa,Osama Faragallah,Elsayed Rabaie,Elsayed Nigm
#Database security
#cryptographic algorithms
#datab ase encryption
#Elsayed Rabaie
#Elsayed Nigm
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
1
2
3
4
5
6
7
8
9
10
15
16
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint