


default search action
The International Arab Journal of Information Technology, Volume 20
Volume 20, Number 1, January 2023
- Qiang Lin, Zhengxing Man, Yongchun Cao, Haijun Wang:

Automated Classification of Whole-Body SPECT Bone Scan Images with VGG-Based Deep Networks. 1-8 - Ali Alzahrani

, Md. Al-Amin Bhuiyan:
On Satellite Imagery of Land Cover Classification for Agricultural Development. 9-18 - Richa Jindal, Sanjay Singla:

Latent Fingerprint Recognition using Hybrid Ant Colony Optimization and Cuckoo Search. 19-28 - Hidayet Takçi, Nusrat Fatema:

Highly Accurate Spam Detection with the Help of Feature Selection and Data Transformation. 29-37 - Ersin Elbasi, Aymen I. Zreikat

:
Heart Disease Classification for Early Diagnosis based on Adaptive Hoeffding Tree Algorithm in IoMT Data. 38-48 - Hanane Bais, Mustapha Machkour

:
A Rule-Induction Approach for Building an Arabic Language Interfaces to Databases. 49-56 - Lokabhiram Dwarakanath

, Amirrudin Kamsin, Liyana Shuib:
A Genetic Algorithm based Domain Adaptation Framework for Classification of Disaster Topic Text Tweets. 57-65 - Hani Al-Balasmeh

, Maninder Singh, Raman Singh
:
Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network. 66-77 - Zeeshan Ashraf

, Adnan Sohail, Sohaib A. Latif, Abdul Hameed
, Muhammad Yousaf Malik
:
Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network. 78-91 - Prem Sagar Sharma, Divakar Yadav:

A Novel Architecture for Search Engine using Domain Based Web Log Data. 92-101 - Jeyalakshmi Chelliah, Kiranbala Benny, Revathi Arunachalam, Viswanathan Balasubramanian:

Robust Hearing-Impaired Speaker Recognition from Speech using Deep Learning Networks in Native Language. 102-112 - Nalina Venkatamune, Jayarekha PrabhaShankar:

A VANET Collision Warning System with Cloud Aided Pliable Q-Learning and Safety Message Dissemination. 113-124 - Subaselvi Sundarraj

, Gunaseelan Konganathan:
A Novel Energy Efficient Harvesting Technique for SDWSN using RF Transmitters with MISO Beamforming. 125-133 - Blessed Guda, Bello Kontagora Nuhu, James Agajo, Ibrahim Aliyu:

Performance Evaluation of Keyword Extraction Techniques and Stop Word Lists on Speech-To-Text Corpus. 134-140 - Hongye Cao

, Qianru Wei, Jiangbin Zheng
:
T-LBERT with Domain Adaptation for Cross-Domain Sentiment Classification. 141-150
Volume 20, Number 2, March 2023
- Kuldeep Singh, Lakhwinder Kaur, Raman Maini

:
Ensemble voting based intrusion detection technique using negative selection algorithm. 151-158 - Hongchuan Luo, Bo Sun, Hangkai Zhou, Wensen Cao:

Image segmentation with multi-feature fusion in compressed domain based on region-based graph. 159-169 - Christonson Berin Jones, Chakravarthi Murugamani:

Malaria parasite detection on microscopic blood smear images with integrated deep learning algorithms. 170-179 - Shahid Alam

, Alper Kamil Demir:
Mining android bytecodes through the eyes of gabor filters for detecting malware. 180-189 - Deepikaa Soundararajan

, Saravanan Ramakrishnan:
Coverless data hiding in VoIP based on DNA steganography with authentication. 190-198 - Vinayak Jagtap

, Parag Kulkarni:
A bayesian network-based uncertainty modeling (BNUM) to analyze and predict next optimal moves in given game scenario. 199-205 - Syed Zeeshan Hussain, Sultana Parween

:
Analysis of TCP issues and their possible solutions in the internet of things. 206-214 - Anandh Sam Chandra Bose, Vasuki Ramesh:

Highly accurate grey neural network classifier for an abdominal aortic aneurysm classification based on image processing approach. 215-223 - Riadh Ghlala, Zahra Kodia

, Lamjed Ben Said:
Using MCDM and FaaS in automating the eligibility of business rules in the decision-making process. 224-233 - Salwa Al Balawi, Nojood Aljohani:

Credit-card fraud detection system using neural networks. 234-241 - Jayachitra Virupakshipuram Panneerselvam, Bharanidharan Subramaniam, Mathangi Meenakshisundaram:

A cognitive approach to predict the multi-directional trajectory of pedestrians. 242-252 - Pin-Chang Su, Tai-Chang Su:

Secure blockchain-based electronic voting mechanism. 253-261 - Imadeldin Elmutasim:

A brief review of massive MIMO technology for the next generation. 262-269 - Donia Ammous, Achraf Chabbouh, Awatef Edhib, Ahmed Chaari, Fahmi Kammoun, Nouri Masmoudi:

Improved YOLOv3-tiny for silhouette detection using regularisation techniques. 270-281 - Shalini Hanok, Shankaraiah:

In loco identity fraud detection model using statistical analysis for social networking sites: a case study with facebook. 282-292
Volume 20, Number 3, May 2023
- Vijay Yadav

, Raghuraj Singh
, Vibhash Yadav:
Estimation model for enhanced predictive object point metric in OO software size estimation using deep learning. 293-302 - Benisha S.

, Mirnalinee T. T.
:
Human facial emotion recognition using deep neural networks. 303-309 - Saed Alqaraleh, Hatice Meltem Nergiz Sirin:

A topic-specific web crawler using deep convolutional networks. 310-318 - Sudha Subramanian, Ganesan Rasu Thevar

:
Segmentation of mammogram abnormalities using ant system based contour clustering algorithm. 319-330 - M. Muthulakshmi, G. Murugeswari:

A hybrid grey wolf-whale optimization algorithm for classification of corona virus genome sequences using deep learning. 331-339 - Suvojit Acharjee

, Sheli Sinha Chaudhuri:
Modified cuckoo search algorithm for motion vector estimation. 340-348 - Aseel Alfaidi, Hajer Alwadei, Areej Alshutayri, Shahd Alahdal:

Exploring the performance of farasa and CAMeL taggers for arabic dialect tweets. 349-356 - Saeed Shurrab

, Yazan Shannak, Rehab Duwairi:
Retina disorders classification via OCT scan: a comparative study between self-supervised learning and transfer learning. 357-367 - Ali Yildiz, Nurettin Gökhan Adar

, Ahmet Mert
:
Convolutional neural network based hand gesture recognition in sophisticated background for humanoid robot control. 368-375 - Jeelani Ahmed, Muqeem Ahmed:

MAPNEWS: a framework for aggregating and organizing online news articles. 376-386 - Kaichuan Sun

, Yubo Tian:
Incorporating triple attention and multi-scale pyramid network for underwater image enhancement. 387-397 - Vinoth Narayanan Arumugam Subramaniam, Rajesh Annamalai:

A novel spam classification system for e-mail using a gradient fuzzy guideline-based spam classifier (GFGSC). 398-406 - Mohammad Ashraf Ottom, Ahmad Al-Omari

:
An adaptive traffic lights system using machine learning. 407-418 - Shimiao Sun, Yashu Liu:

A method of extracting malware features based on gini impurity increment and improved TF-IDF. 419-427 - Li Chen, Huah Yong Chan:

Generative adversarial networks with data augmentation and multiple penalty areas for image synthesis. 428-434
Volume 20, Number 3A, Special Issue 2023
- Haythem Bany Salameh, Mustafa Ali:

Tree-based multicast routing and channel assignment for enhanced throughout in emerging cognitive radio networks. 435-445 - Saad Bani-Mohammad, Ismail Ababneh:

On rapid transitioning to online learning under COVID-19: challenges and solutions at al al-bayt university. 446-460 - Meryeme Hadni, Hjiaj Hassane

:
New model of feature selection based chaotic firefly algorithm for arabic text categorization. 461-468 - Ramzi Zouari, Dalila Othmen, Houcine Boubaker, Monji Kherallah:

Temporal residual network based multi-head attention model for arabic handwriting recognition. 469-476 - Amer Qasim, Ghaleb A. El Refae

, Shorouq Eletter:
A proposed model to integrate drone technology in accounting for long term contracts: a cash flow management perspictive. 477-484 - Aicha Nouisser, Ramzi Zouari

, Monji Kherallah:
Deep learning based mobilenet and multi-head attention model for facial expression recognition. 485-491 - Nura Shifa Musa

, Nada Masood Mirza, Adnan Ali:
Navigating the complex landscape of IoT forensics: challenges and emerging solutions. 492-504 - Marko Grebovic, Luka Filipovic, Ivana Katnic

, Milica Vukotic, Tomo Popovic
:
Machine learning models for statistical analysis. 505-514 - Muhammed Talha Zavalsiz, Sleiman Alhajj, Kashfia Sailunaz, Tansel Özyer, Reda Alhajj:

A comparative study of different pre-trained deep learning models and custom CNN for pancreatic tumor detection. 515-526 - Dheya Mustafa

, Intisar Ghazi Mustafa, Samah Zriqat, Qutaibah Althebyan:
MIRNA: adaptive 3D game to assist children's distance learning difficulties; design and teachers' intention to use. 527-535 - Musab Mustafa Hijazi, Akram M. Zeki, Amelia Ismail:

Utilizing artificial bee colony algorithm as feature selection method in arabic text classification. 536-547 - Yousra Odeh, Dina Tbaishat, Faten F. Kharbat, Omar Shamieh, Mohammed Odeh:

Linking palliative homecare to the universal health coverage principles and the united nations sustainability development goals using the i* frameworks strategic and social requirements modelling, applied to a cancer care organisation. 548-558
Volume 20, Number 4, July 2023
- Giji Kiruba Dasebenezer

, Benita Joselin:
TSO clustered protocol to extend lifetime of IoT based mobile wireless sensor networks. 559-566 - Surbhi Kapoor, Akashdeep Sharma, Amandeep Verma, Vishal Dhull, Chahat Goyal:

A comparative study on deep learning and machine learning models for human action recognition in aerial videos. 567-574 - Mohaideen Pitchai:

Genetic algorithm with random and memory immigrant strategies for solving dynamic load balanced clustering problem in wireless sensor networks. 575-583 - Ilker Kilic:

A novel codebook generation by smart fruit fly algorithm based on exponential flight. 584-591 - Shimin Xiong, Bin Li, Shiao Zhu, Dongfei Cui, Xiaonan Song:

Spatial pyramid pooling and adaptively feature fusion based yolov3 for traffic sign detection. 592-599 - Nivethitha Vijayaraj, Arunagiri Sivasubramanian:

Intensification and interpretation of performance in 5G adopting millimeter wave: a survey and future research direction. 600-608 - Shujuan Wang, Haofu Guan, Yuqing Wang, Kanghui Zhang, Yuntao Dai, Shouxu Qiao:

Intelligent recognition of gas-liquid two-phase flow based on optical image. 609-617 - Hemmak Allaoua

:
Exact algorithm for batch scheduling on unrelated machine. 618-623 - Esin Karpat

, Fatih Imamoglu:
Optimization and comparative analysis of quarter-circular slotted microstrip patch antenna using particle swarm and fruit fly algorithms. 624-631 - Dhivya Samraj

, Kuppuchamy Ramasamy
, Muralidharan Karuppusamy
:
Evolutionary computing model for finding breast cancer masses using image enhancement procedures with artificial intelligent algorithms. 632-643 - Himanshu Dubey, Shobha Bhatt, Lokesh Negi:

Digital forensics techniques and trends: a review. 644-654 - Mohammad Yahia, Husni Al-Muhtaseb

:
BPTI: bilingual printed text images dataset for recognition purposes. 655-668 - Mohammed Alghaili, Zhiyong Li, Ahmed Jawad A. AlBdairi

, Malasy Katiyalath:
Generating embedding features using deep learning for ethnics recognition. 669-677 - Nouh Alhindawi

:
IoT based technique for network packet analyzer. 678-685 - Mohamad M. Al-Laham, Mohammad Al-Ma'aitah, Ziad A. Alqadi

:
A simple and stable method of creating fingerprint features with image rotation. 686-692
Volume 20, Number 5, September 2023
- Mohammed Abebe Yimer

, Özlem Aktas, Süleyman Sevinc, Ali Riza Sisman:
Establishing cause-effect relationships from medical treatment data in intensive care unit settings. 693-701 - Naresh Sammeta, Latha Parthiban

:
Blockchain-based scalable and secure EHR data sharing using proxy re-encryption. 702-710 - Shutong Pang, Ziwei Yang, Chengyou Cai, Zhimin Li:

Design and study of zombie enterprise classification and recognition systems based on ensemble learning. 711-716 - Le Cheng, Lyu Chang, Yanhong Song, Haibo Wang, Yuetang Bian:

A robot path planning method based on synergy behavior of cockroach colony. 717-726 - Allam Mohan, Malaiyappan Nandhini

:
Hybrid feature selection based on BTLBO and RNCA to diagnose the breast cancer. 727-737 - Ruzhi Xu, Min Li, Xin Yang, Dexin Liu, Dawei Chen:

Research on a method of defense adversarial samples for target detection model of driverless cars. 738-747 - Anusha Padmavathi Rajendran, Dhanalakshmi Krishnan Sadhasivam:

Multi-level attack with dynamic s-box variable key pattern generation for key cohort using AES. 748-757 - Jyoti Kulkarni, Rajankumar Bichkar:

A modified technique of hybrid multiobjective genetic algorithm for image fusion. 758-766 - Sudip Suklabaidya

, Indrani Das:
Performance comparison of multiple ANN optimizer on IoT-enabled sensor fire dataset. 767-772 - Jyoti Agarwal, Manoj Kumar

, Mugdha Sharma, Deepak Verma, Richa Sharma
:
Application of intelligent adaptive neuro fuzzy method for reusability of component based software system. 773-781 - Hayri Incekara, Murat Selek, Fatih Basçiftçi:

Optimization of quadrotor route planning with time and energy priority in windy environments. 782-795 - Saravanan Arumugam

:
An effective hybrid encryption model using biometric key for ensuring data security. 796-807 - Shu-Fen Tu, Ching-Sheng Hsu, Bo-Long You:

An on-site electronic voting system using blockchain and biometrics. 808-818 - Parisa Begum Kaleel, Shina Sheen:

Focused crawler based on reinforcement learning and decaying epsilon-greedy exploration policy. 819-830 - Chunmei Chen, Zhiqiang Liang, Haitao Liu, Xin Liu:

Spatial and semantic information enhancement for indoor 3D object detection. 831-839
Volume 20, Number 6, November 2023
- Amer Abu Salem:

An effective management model for data caching in manet environment. 841-851 - M. Mohamed Iqbal, Kesavarao Latha:

A hadoop based approach for community detection on social networks using leader nodes. 852-862 - Aarthee Selvaraj

, Prabakaran Rajendran, Kanimozhi Rajangam:
A novel resource scheduler for resource allocation and scheduling in big data using hybrid optimization algorithm at cloud environment. 863-873 - Sibel Tariyan Özyer:

Induction of co-existing items available in distributed version control systems for software development. 874-879 - Tong Liu, Haoyu Liu, Weijian Ni, Mengxiao Si:

Joint extraction of organizations and relations for emergency response plans with rich semantic information based on multi-head attention mechanism. 880-889 - Ambily Balaram, Nedunchezhian Raju

:
An effective reference-point-set (RPS) based bi-directional frequent itemset generation. 890-898 - Emre Tercan, Serkan Tapkin

, Furkan Küçük, Ali Demirtas, Ahmet Murat Özbayoglu, Abdussamet Türker:
Computational intelligence based point of interest detection by video surveillance implementations. 899-910 - Atul Kumar, Arun Mishra

:
LWE based quantum-resistant pseudo-random number generator. 911-918 - Jennyfer Susan M. B.

, Parthasarathy Subashini:
Deep learning inpainting model on digital and medical images-a review. 919-936 - Ming Xu:

A highly parallelizable hash algorithm based on latin cubes. 937-945 - Akshay Mudgal

, Shaveta Bhatia
:
An experimental based study to evaluate the efficiency among stream processing tools. 946-953 - Anitha Dharmalingaswamy, Pitchai Latha:

Additive metric composition-based load aware reliable routing protocol for improving the quality of service in industrial internet of things. 954-964 - Ali Al Maqousi, Mohammad Alauthman

:
RoboGuard: enhancing robotic system security with ensemble learning. 965-976 - Shahd Alqam, Nasser Alzeidi, Abderezak Touzene

, Khaled Day:
Live virtual machine migration in fog computing: state of the art. 977-995 - Mohamed D. Almadhoun

, Nurul Malim:
Effects of using arabic web pages in building rank estimation algorithm for google search engine results page. 996-1007

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














