Stop the war!
Остановите войну!
for scientists:
default search action
The International Arab Journal of Information Technology, Volume 21
Volume 21, Number 1, January 2024
- Fouzia El Azzaby, Nabil El Akkad, Khalid Sabour:
The coupling of a multiplicative group and the theory of chaos in the encryptions of images. 1-16 - Bangalore Nagaraj Madhukar, Shivanandamurthy Hiremath Bharathi, Matta Polnaya Ashwin:
Classification of breast cancer using ensemble filter feature selection with triplet attention based efficient net classifier. 17-31 - Deepali Bajaj, Anita Goel, Suresh Chand Gupta:
A comprehensive microservice extraction approach integrating business functions and database entities. 32-45 - Sandeep Sutar, Manjunathswamy Byranahalli Eraiah, Kumarswamy Shivashankaraiah:
A dual-objective approach for allocation of virtual machine with improved job scheduling in cloud computing. 46-56 - Vimala Devi Parthasarathy, Kalaichelvi Visvalingam:
Healthcare data security in cloud storage using light weight symmetric key algorithm. 57-66 - Ruijuan Hu, Haiyan Liu, Wentao Yu:
ERDAP: A novel method of event relation data augmentation based on relation prediction. 67-74 - Jing Zhang, Guiyan Wei, Yonggong Ren:
Cohesive pair-wises constrained deep embedding for semi-supervised clustering with very few labeled samples*. 75-84 - Elamparithi Pandian, K. Ruba Soundar, Shenbagalakshmi Gunasekaran, Shenbagarajan Anantharajan:
Fuzzy heuristics for detecting and preventing black hole attack. 85-93 - Reshma Vengaloor, Roopa Muralidhar:
Deep learning based feature discriminability boosted concurrent metal surface defect detection system using YOLOv-5s-FRN. 94-106 - Khushboo Agarwal, Manish Dixit:
Scrupulous SCGAN framework for recognition of restored images with caffe based PCA filtration. 107-116 - Jiayao Li, Rui Wang:
An anomaly detection method for weighted data based on feature association analysis. 117-127 - Mustafa Al-Fayoumi, Qasem Abu Al-Haija, Rakan Armoush, Christine Amareen:
XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering. 128-146 - Yuanyuan Gao, Qiang Qian, Xuefeng Sun, Jiankun An, Yutao Yuan:
Evaluation model of athletes' lower extremity training ability based on LSTM algorithm. 147-157 - Abiodun Oguntimilehin, Kolade Balogun:
Real-time sign language fingerspelling recognition using convolutional neural network. 158-165 - Gokul Narayanan, Saravanaguru Kannan:
Enhancing security in cloud-based VM migration: a trust-centric hybrid optimization approach. 166-177
Volume 21, Number 2, March 2024
- Praveen M. Dhulavvagol, Shashikumar G. Totad, Atrey Anagal:
SHARD-FEMF: adaptive forensic evidence management framework using blockchain sharding and IPFS. 179-190 - Rachid Karra, Abdelali Lasfar:
Analysis of QA system behavior against context and question changes. 191-200 - Anusha Thanganadar, Venkatesan Raman:
Integrated shared random key agreement protocol for wireless sensor network. 201-210 - Ahmad Nabot:
Software component selection: an optimized selection criterion for component-based software engineering (CBSE). 211-225 - Jagtap Vinyak, Parag Kulkarni, Pallavi Joshi:
Turning point induced knowledge forecasting under uncertainties (TrIK). 226-232 - Veena Sivasamy Thanasekaran, Arivazhagan Selvaraj:
Low dimensional multi class steganalysis of spatial LSB based stego images using textural features. 233-242 - Mohammed A. Alqarni:
Embedding search for quranic texts based on large language models. 243-256 - Mohammed Maree, Mujahed Eleyat, Enas Mesqali:
Optimizing machine learning-based sentiment analysis accuracy in bilingual sentences via preprocessing techniques. 257-270 - Jawad Hasan Alkhateeb, Ehsan Owaidah, Aiman Turani, Rashiq Marie, Aladdein M. Amro, Ahmad A. Mazhar:
A framework for saudi uniform gait recognition based on kinect skeletal tracking. 271-279 - Abeer Hamed, Alaa Mohamed Riad, Ramadan Mowad, Hazem M. El-Bakry:
Software quality assessment approach using analytical hierarchical model: applied in SMEs. 280-291 - Srinivasan Narayanasamy, Mohan Kumar Palanichamy, Selvam Lakshmanan, Arokia Renjit Jerald:
Achieving better resource utilization by implementing a high-performance intelligent framework in a distributed environment. 292-298 - Jun Wang, Yuanxi Wang:
FD technology for HSs based on deep convolutional generative adversarial networks. 299-312 - Ghizlane Bourahouat, Manar Abourezq, Najima Daoudi:
Word embedding as a semantic feature extraction technique in arabic natural language processing: an overview. 313-325 - Muyideen Ayodeji Alaketu, Abiodun Oguntimilehin, Kehinde Adebola Olatunji, Oluwatoyin Bunmi Abiola, Bukola Badeji-Ajisafe, Christiana Olanike Akinduyite, Stephen Eyitayo Obamiyi, Gbemisola Olutosin Babalola, Toyin Okebule:
Comparative analysis of intrusion detection models using big data analytics and machine learning techniques. 326-337 - Aditya Dubey, Pradeep Yadav, Subhash Chandra Patel:
Usage of statistical techniques to monitor the performance of wind turbines. 338-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.