Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iajit/iajit21.bht:"
@article{DBLP:journals/iajit/AgarwalD24, author = {Khushboo Agarwal and Manish Dixit}, title = {Scrupulous {SCGAN} framework for recognition of restored images with caffe based {PCA} filtration}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {107--116}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/10}, doi = {10.34028/IAJIT/21/1/10}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/AgarwalD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/Al-FayoumiAAA24, author = {Mustafa Al{-}Fayoumi and Qasem Abu Al{-}Haija and Rakan Armoush and Christine Amareen}, title = {{XAI-PDF:} a robust framework for malicious {PDF} detection leveraging SHAP-based feature engineering}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {128--146}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/12}, doi = {10.34028/IAJIT/21/1/12}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/Al-FayoumiAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/AlaketuOOABAOBO24, author = {Muyideen Ayodeji Alaketu and Abiodun Oguntimilehin and Kehinde Adebola Olatunji and Oluwatoyin Bunmi Abiola and Bukola Badeji{-}Ajisafe and Christiana Olanike Akinduyite and Stephen Eyitayo Obamiyi and Gbemisola Olutosin Babalola and Toyin Okebule}, title = {Comparative analysis of intrusion detection models using big data analytics and machine learning techniques}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {326--337}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/14}, doi = {10.34028/IAJIT/21/2/14}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/AlaketuOOABAOBO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/AlkhateebOTMAM24, author = {Jawad Hasan Alkhateeb and Ehsan Owaidah and Aiman Turani and Rashiq Marie and Aladdein M. Amro and Ahmad A. Mazhar}, title = {A framework for saudi uniform gait recognition based on kinect skeletal tracking}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {271--279}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/9}, doi = {10.34028/IAJIT/21/2/9}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/AlkhateebOTMAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/Alqarni24, author = {Mohammed A. Alqarni}, title = {Embedding search for quranic texts based on large language models}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {243--256}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/7}, doi = {10.34028/IAJIT/21/2/7}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/Alqarni24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/AzzabyES24, author = {Fouzia El Azzaby and Nabil El Akkad and Khalid Sabour}, title = {The coupling of a multiplicative group and the theory of chaos in the encryptions of images}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {1--16}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/1}, doi = {10.34028/IAJIT/21/1/1}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/AzzabyES24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/BajajGG24, author = {Deepali Bajaj and Anita Goel and Suresh Chand Gupta}, title = {A comprehensive microservice extraction approach integrating business functions and database entities}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {32--45}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/3}, doi = {10.34028/IAJIT/21/1/3}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/BajajGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/BourahouatAD24, author = {Ghizlane Bourahouat and Manar Abourezq and Najima Daoudi}, title = {Word embedding as a semantic feature extraction technique in arabic natural language processing: an overview}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {313--325}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/13}, doi = {10.34028/IAJIT/21/2/13}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/BourahouatAD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/DhulavvagolTA24, author = {Praveen M. Dhulavvagol and Shashikumar G. Totad and Atrey Anagal}, title = {{SHARD-FEMF:} adaptive forensic evidence management framework using blockchain sharding and {IPFS}}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {179--190}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/1}, doi = {10.34028/IAJIT/21/2/1}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/DhulavvagolTA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/DubeyYP24, author = {Aditya Dubey and Pradeep Yadav and Subhash Chandra Patel}, title = {Usage of statistical techniques to monitor the performance of wind turbines}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {338--349}, year = {2024}, url = {https://iajit.org/paper/5023/Usage-of-Statistical-Techniques-to-Monitor-the-Performance-of-Wind-Turbines}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/DubeyYP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/GaoQSAY24, author = {Yuanyuan Gao and Qiang Qian and Xuefeng Sun and Jiankun An and Yutao Yuan}, title = {Evaluation model of athletes' lower extremity training ability based on {LSTM} algorithm}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {147--157}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/13}, doi = {10.34028/IAJIT/21/1/13}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/GaoQSAY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/HamedRME24, author = {Abeer Hamed and Alaa Mohamed Riad and Ramadan Mowad and Hazem M. El{-}Bakry}, title = {Software quality assessment approach using analytical hierarchical model: applied in SMEs}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {280--291}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/10}, doi = {10.34028/IAJIT/21/2/10}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/HamedRME24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/HuLY24, author = {Ruijuan Hu and Haiyan Liu and Wentao Yu}, title = {{ERDAP:} {A} novel method of event relation data augmentation based on relation prediction}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {67--74}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/6}, doi = {10.34028/IAJIT/21/1/6}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/HuLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/KarraL24, author = {Rachid Karra and Abdelali Lasfar}, title = {Analysis of {QA} system behavior against context and question changes}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {191--200}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/2}, doi = {10.34028/IAJIT/21/2/2}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/KarraL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/LiW24, author = {Jiayao Li and Rui Wang}, title = {An anomaly detection method for weighted data based on feature association analysis}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {117--127}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/11}, doi = {10.34028/IAJIT/21/1/11}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/LiW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/MadhukarBA24, author = {Bangalore Nagaraj Madhukar and Shivanandamurthy Hiremath Bharathi and Matta Polnaya Ashwin}, title = {Classification of breast cancer using ensemble filter feature selection with triplet attention based efficient net classifier}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {17--31}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/2}, doi = {10.34028/IAJIT/21/1/2}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/MadhukarBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/MareeEM24, author = {Mohammed Maree and Mujahed Eleyat and Enas Mesqali}, title = {Optimizing machine learning-based sentiment analysis accuracy in bilingual sentences via preprocessing techniques}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {257--270}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/8}, doi = {10.34028/IAJIT/21/2/8}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/MareeEM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/Nabot24, author = {Ahmad Nabot}, title = {Software component selection: an optimized selection criterion for component-based software engineering {(CBSE)}}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {211--225}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/4}, doi = {10.34028/IAJIT/21/2/4}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/Nabot24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/NarayananK24, author = {Gokul Narayanan and Saravanaguru Kannan}, title = {Enhancing security in cloud-based {VM} migration: a trust-centric hybrid optimization approach}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {166--177}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/15}, doi = {10.34028/IAJIT/21/1/15}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/NarayananK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/NarayanasamyPLJ24, author = {Srinivasan Narayanasamy and Mohan Kumar Palanichamy and Selvam Lakshmanan and Arokia Renjit Jerald}, title = {Achieving better resource utilization by implementing a high-performance intelligent framework in a distributed environment}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {292--298}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/11}, doi = {10.34028/IAJIT/21/2/11}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/NarayanasamyPLJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/OguntimilehinB24, author = {Abiodun Oguntimilehin and Kolade Balogun}, title = {Real-time sign language fingerspelling recognition using convolutional neural network}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {158--165}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/14}, doi = {10.34028/IAJIT/21/1/14}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/OguntimilehinB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/PandianSGA24, author = {Elamparithi Pandian and K. Ruba Soundar and Shenbagalakshmi Gunasekaran and Shenbagarajan Anantharajan}, title = {Fuzzy heuristics for detecting and preventing black hole attack}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {85--93}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/8}, doi = {10.34028/IAJIT/21/1/8}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/PandianSGA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/ParthasarathyV24, author = {Vimala Devi Parthasarathy and Kalaichelvi Visvalingam}, title = {Healthcare data security in cloud storage using light weight symmetric key algorithm}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {57--66}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/5}, doi = {10.34028/IAJIT/21/1/5}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/ParthasarathyV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/SutarES24, author = {Sandeep Sutar and Manjunathswamy Byranahalli Eraiah and Kumarswamy Shivashankaraiah}, title = {A dual-objective approach for allocation of virtual machine with improved job scheduling in cloud computing}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {46--56}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/4}, doi = {10.34028/IAJIT/21/1/4}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/SutarES24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/ThanasekaranS24, author = {Veena Sivasamy Thanasekaran and Arivazhagan Selvaraj}, title = {Low dimensional multi class steganalysis of spatial {LSB} based stego images using textural features}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {233--242}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/6}, doi = {10.34028/IAJIT/21/2/6}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/ThanasekaranS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/ThanganadarR24, author = {Anusha Thanganadar and Venkatesan Raman}, title = {Integrated shared random key agreement protocol for wireless sensor network}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {201--210}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/3}, doi = {10.34028/IAJIT/21/2/3}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/ThanganadarR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/VengaloorM24, author = {Reshma Vengaloor and Roopa Muralidhar}, title = {Deep learning based feature discriminability boosted concurrent metal surface defect detection system using YOLOv-5s-FRN}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {94--106}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/9}, doi = {10.34028/IAJIT/21/1/9}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/VengaloorM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/VinyakKJ24, author = {Jagtap Vinyak and Parag Kulkarni and Pallavi Joshi}, title = {Turning point induced knowledge forecasting under uncertainties (TrIK)}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {226--232}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/2/5}, doi = {10.34028/IAJIT/21/2/5}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/VinyakKJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/WangW24, author = {Jun Wang and Yuanxi Wang}, title = {{FD} technology for HSs based on deep convolutional generative adversarial networks}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {2}, pages = {299--312}, year = {2024}, url = {https://iajit.org/paper/5026/FD-Technology-for-HSs-based-on-Deep-Convolutional-Generative-Adversarial-Networks}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/WangW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/ZhangWR24, author = {Jing Zhang and Guiyan Wei and Yonggong Ren}, title = {Cohesive pair-wises constrained deep embedding for semi-supervised clustering with very few labeled samples*}, journal = {Int. Arab J. Inf. Technol.}, volume = {21}, number = {1}, pages = {75--84}, year = {2024}, url = {https://doi.org/10.34028/iajit/21/1/7}, doi = {10.34028/IAJIT/21/1/7}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/ZhangWR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.