ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: paper
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Arab Face Recognition and Identification Based on Ethnicity and Gender Using Machine Learning
Mohammed Abual-Rub,Khalid Nahar,Ammar Almomani,Firas Alzobi
#Ethnicity
#facial recognition
#neural network
#multi-class classification
#machine learning
#facial features
Sales Forecasting and Consumption Recommendation System of E-commerce Agricultural Products Based on LSTM Model
Jianwei Wu
#LSTM model
#sales forecast of agricultural products
#e-commerce
#personalized recommendation system
HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services
Abdelraouf Ishtaiwi,Ahmad Nabot,Omar Alzubi,Awad Ramadan,Abdulbasit Darem,Asma Alhashmi,Mohammad Alauthman,Amjad Aldweesh
#Hybrid concurrency control
#local validation
#global validation
#edge-cloud
An Effective Online Learning Course Recommendation Using Improved Deep Active Convolutional Neural Network Based Sentiment Analysis and Ranking
Roshan Bhanuse,Sandip Mal
#Text pre-processing
#feature extraction
#feature selection
#optimization
#sentiment analysis
#online learning
#recommendation
Novel Compression System for Hue-Saturation and Intensity Color Space
Noura Semary,Mohiy Hadhoud,Hatem Abdul-Kader,Alaa Abbas
#Hue
#saturation
#intensity
#encoding
#compression
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases
Ayman Mousa,Osama Faragallah,Elsayed Rabaie,Elsayed Nigm
#Database security
#cryptographic algorithms
#datab ase encryption
#Elsayed Rabaie
#Elsayed Nigm
Interactive Query Expansion using Concept-Based Directions Finder Based on Wikipedia
Yuvarani Meiyappan,Sriman Narayana Iyengar
#Interactive query expansion
#term suggestion
#direc tion finder
#term extractor
#web search
#Wikipedia
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
An Improved Version of the Visual Digital Signature Scheme
Abdullah Jaafar,Azman Samsudin
#Digital signature
#non&expansion visual cryptograph y
#boolean operation
#visual share
Bi-Level Weighted Histogram Equalization for Scalable Brightness Preservation and Contrast Enhancement for Images
Shanmugavadivu Pichai,Balasubramanian Krishnasamy,Somasundaram Karuppanagounder
#Contrast enhancement
#brightness preservation
#hist ogram equalization
#peak signal to noise ratio
#absolute mean brightness error
#structural similarity index matri x
Modeling Fuzzy Data with Fuzzy Data Types in Fuzzy Database and XML Models
Li Yan
#Database models
#fuzzy data
#fuzzy data types
#fuzzy databases
#fuzzy XML
#modeling
The Statistical Quantized Histogram Texture Features Analysis for Image Retrieval Based on Median and Laplacian Filters in the DCT Domain
Fazal Malik,Baharum Baharudin
#CBIR
#median filter
#laplacian filter
#statistical texture features
#quantized histograms
#DCT
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal Medical Image Fusion
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Dual-End Recommendation Algorithm Integrating User Intent and Knowledge-Aware Attention Networks
Zijie Ji,Teng Lv,Yi Yu
#Recommendation model
#user intent
#knowledge-aware attention
#dual-end recommendation
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Dual-End Recommendation Algorithm Integrating User Intent and Knowledge-Aware Attention Networks
Zijie Ji,Teng Lv,Yi Yu
#Recommendation model
#user intent
#knowledge-aware attention
#dual-end recommendation
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Symmetric Classes of Series-Parallel Digraphs
Ruzayn Quaddoura
#Digraphs
#series-parallel digraphs
#design and analysis of algorithms
#complexity
1
2
3
4
5
6
7
8
9
10
43
44
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint