ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: challenges
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Inventory Optimization Using Data Science Technologies for Supply Chain 4.0
Emna Bouazizi,Ayman Khedr,Sherin Elfaioumy,Mohamed Belal
#Supply chain 4.0
#inventory management
#regression algorithm
#optimization
Disease Prognosis of Fetal Heart’s Four-Chamber and Blood Vessels in Ultrasound Images Using CNN Incorporated VGG 16 and Enhanced DRNN
Someshwaran Gunasekaran,Sarada Vivekasaran
#Fetal heart disease
#ultrasound images
#augmented wiener filter
#median modified wiener filter
#region of interest
#convolutional neural network
#visual geometry group 16
#deep recurrent neural network
Arabic Text Detection on Traffic Panels in Natural Scenes
Houssem Turki,Mohamed Elleuch,Kamal Othman,Monji Kherallah
#Traffic panels
#scene Arabic text detection
#traffic textual information
#Arabic scripts in the wild
#deep learning
A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
Laid Kenioua,Brahim Lejdel,Mohamed Abdelhamid Nedioui
#Autonomous vehicles
#positioning security
#secure communication
#semi-decentralized collaboration architecture
#edge computing
#data collection
#consensus
CANBLWO: A Novel Hybrid Approach for Semantic Text Generation
Abhishek Kumar Pandey,Sanjiban Sekhar Roy
#Natural language processing
#natural language generation
#neural network
#convolutional attention network
#whale optimization algorithm
#BERT
#large language model
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Heart Disease Diagnosis Using Decision Trees with Feature Selection Method
Alaa Sheta,Walaa El-Ashmawi,Abdelkarim Baareh
#Machine learning
#classification
#decision tree
#heart disease
#diagnosis
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Embedding Search for Quranic Texts based on Large Language Models
Mohammed Alqarni
#Semantic search
#quranic texts
#large language models
#GPT 3
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Embedding Search for Quranic Texts based on Large Language Models
Mohammed Alqarni
#Semantic search
#quranic texts
#large language models
#GPT 3
Deep Learning Inpainting Model on Digital and Medical Images-A Review
Jennyfer Susan,Parthasarathy Subashini
#Image inpainting
#image restoration
#deep learning
#supervised method
#unsupervised method
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
Live Virtual Machine Migration in Fog Computing: State of the Art
Shahd Alqam,Nasser Alzeidi,Abderrezak Touzene,Khaled Day
#Live virtual machine migration
#conventional algorithms
#fog computing architecture
#live migration algorithms classification
#artificial intelligence
#framework modeling
Spatial and Semantic Information Enhancement for Indoor 3D Object Detection
Chunmei Chen,Zhiqiang Liang,Haitao Liu,Xin Liu
#3D object detection
#edge convolution
#attention mechanism
#spatial information
#semantic information
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
On Rapid Transitioning to Online Learning Under COVID-19: Challenges and Solutions at Al al-Bayt University
Saad Bani-Mohammad,Ismail Ababneh
#Online learning
#face-to-face learning
#rapid transitioning
#COVID-19 pandemic
Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions
Nura Shifa Musa,Nada Masood Mirza,Adnan Ali
#Digital forensic
#internet of things
#internet of things forensics
#forensic investigation process
#challenges
#emerging solutions
A Method of Extracting Malware Features Based on Gini Impurity Increment and Improved TF-IDF
Shimiao Sun,Yashu Liu
#Gini impurity increment
#TF-IDF
#feature selection
#dimensionality reduction
1
2
3
4
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint