


default search action
The International Arab Journal of Information Technology, Volume 21
Volume 21, Number 1, January 2024
- Fouzia El Azzaby  , Nabil El Akkad, Khalid Sabour: , Nabil El Akkad, Khalid Sabour:
 The coupling of a multiplicative group and the theory of chaos in the encryptions of images. 1-16
- Bangalore Nagaraj Madhukar, Shivanandamurthy Hiremath Bharathi, Matta Polnaya Ashwin: 
 Classification of breast cancer using ensemble filter feature selection with triplet attention based efficient net classifier. 17-31
- Deepali Bajaj, Anita Goel, Suresh Chand Gupta: 
 A comprehensive microservice extraction approach integrating business functions and database entities. 32-45
- Sandeep Sutar, Manjunathswamy Byranahalli Eraiah, Kumarswamy Shivashankaraiah: 
 A dual-objective approach for allocation of virtual machine with improved job scheduling in cloud computing. 46-56
- Vimala Devi Parthasarathy, Kalaichelvi Visvalingam  : :
 Healthcare data security in cloud storage using light weight symmetric key algorithm. 57-66
- Ruijuan Hu, Haiyan Liu, Wentao Yu: 
 ERDAP: A novel method of event relation data augmentation based on relation prediction. 67-74
- Jing Zhang, Guiyan Wei, Yonggong Ren: 
 Cohesive pair-wises constrained deep embedding for semi-supervised clustering with very few labeled samples*. 75-84
- Elamparithi Pandian  , K. Ruba Soundar, Shenbagalakshmi Gunasekaran, Shenbagarajan Anantharajan: , K. Ruba Soundar, Shenbagalakshmi Gunasekaran, Shenbagarajan Anantharajan:
 Fuzzy heuristics for detecting and preventing black hole attack. 85-93
- Reshma Vengaloor, Roopa Muralidhar: 
 Deep learning based feature discriminability boosted concurrent metal surface defect detection system using YOLOv-5s-FRN. 94-106
- Khushboo Agarwal, Manish Dixit: 
 Scrupulous SCGAN framework for recognition of restored images with caffe based PCA filtration. 107-116
- Jiayao Li, Rui Wang: 
 An anomaly detection method for weighted data based on feature association analysis. 117-127
- Mustafa Al-Fayoumi, Qasem Abu Al-Haija  , Rakan Armoush, Christine Amareen: , Rakan Armoush, Christine Amareen:
 XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering. 128-146
- Yuanyuan Gao, Qiang Qian, Xuefeng Sun, Jiankun An, Yutao Yuan: 
 Evaluation model of athletes' lower extremity training ability based on LSTM algorithm. 147-157
- Abiodun Oguntimilehin, Kolade Balogun: 
 Real-time sign language fingerspelling recognition using convolutional neural network. 158-165
- Gokul Narayanan, Saravanaguru Kannan: 
 Enhancing security in cloud-based VM migration: a trust-centric hybrid optimization approach. 166-177
Volume 21, Number 2, March 2024
- Praveen M. Dhulavvagol, Shashikumar G. Totad, Atrey Anagal: 
 SHARD-FEMF: adaptive forensic evidence management framework using blockchain sharding and IPFS. 179-190
- Rachid Karra  , Abdelali Lasfar: , Abdelali Lasfar:
 Analysis of QA system behavior against context and question changes. 191-200
- Anusha Thanganadar, Venkatesan Raman: 
 Integrated shared random key agreement protocol for wireless sensor network. 201-210
- Ahmad Nabot: 
 Software component selection: an optimized selection criterion for component-based software engineering (CBSE). 211-225
- Jagtap Vinyak, Parag Kulkarni, Pallavi Joshi: 
 Turning point induced knowledge forecasting under uncertainties (TrIK). 226-232
- Veena Sivasamy Thanasekaran  , Arivazhagan Selvaraj: , Arivazhagan Selvaraj:
 Low dimensional multi class steganalysis of spatial LSB based stego images using textural features. 233-242
- Mohammed A. Alqarni: 
 Embedding search for quranic texts based on large language models. 243-256
- Mohammed Maree, Mujahed Eleyat, Enas Mesqali: 
 Optimizing machine learning-based sentiment analysis accuracy in bilingual sentences via preprocessing techniques. 257-270
- Jawad Hasan Alkhateeb, Ehsan Owaidah, Aiman Turani, Rashiq Marie, Aladdein M. Amro, Ahmad A. Mazhar: 
 A framework for saudi uniform gait recognition based on kinect skeletal tracking. 271-279
- Abeer Hamed  , Alaa Mohamed Riad, Ramadan Mowad, Hazem M. El-Bakry: , Alaa Mohamed Riad, Ramadan Mowad, Hazem M. El-Bakry:
 Software quality assessment approach using analytical hierarchical model: applied in SMEs. 280-291
- Srinivasan Narayanasamy, Mohan Kumar Palanichamy, Selvam Lakshmanan, Arokia Renjit Jerald: 
 Achieving better resource utilization by implementing a high-performance intelligent framework in a distributed environment. 292-298
- Jun Wang, Yuanxi Wang: 
 FD technology for HSs based on deep convolutional generative adversarial networks. 299-312
- Ghizlane Bourahouat  , Manar Abourezq, Najima Daoudi: , Manar Abourezq, Najima Daoudi:
 Word embedding as a semantic feature extraction technique in arabic natural language processing: an overview. 313-325
- Muyideen Ayodeji Alaketu, Abiodun Oguntimilehin, Kehinde Adebola Olatunji, Oluwatoyin Bunmi Abiola, Bukola Badeji-Ajisafe, Christiana Olanike Akinduyite, Stephen Eyitayo Obamiyi, Gbemisola Olutosin Babalola, Toyin Okebule: 
 Comparative analysis of intrusion detection models using big data analytics and machine learning techniques. 326-337
- Aditya Dubey, Pradeep Yadav, Subhash Chandra Patel: 
 Usage of statistical techniques to monitor the performance of wind turbines. 338-349
Volume 21, Number 3, May 2024
- Nischita Waddenkery, Shridevi Soma: 
 Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network. 351-368
- Muhammad Siddiqi, Yousef Alhwaiti, Said Elaiwat, Marwan Abu-Zanona: 
 Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose and Esophagus Studies. 369-380
- Xiaowen Li: 
 Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning. 381-393
- Hussam Alawneh, Ahmad Hasasneh: 
 Survival Prediction of Children after Bone Marrow Transplant Using Machine Learning Algorithms. 394-407
- Shefa A. Dawwd: 
 FPGA based Flexible Implementation of Light Weight Inference on Deep Convolutional Neural Networks. 408-417
- Seyyid Ahmed Medjahed, Fatima Boukhatem: 
 Narwhal Optimizer: A Novel Nature-Inspired Metaheuristic Algorithm. 418-426
- Alaa F. Sheta, Walaa H. Elashmwai, Abdelkarim Baareh: 
 Heart Disease Diagnosis Using Decision Trees with Feature Selection Method. 427-438
- Santhi Selvaraj  , Selva Nidhyananthan Sundaradhas , Selva Nidhyananthan Sundaradhas : :
 Determining PolyCystic Ovarian Syndrome Severity from Reddit Posts using Topic Modelling and Association Rule Mining. 439-457
- Asmaa A. E. Osman, Mohamed A. Wahby Shalaby, Mona Soliman  , Khaled Mostafa Elsayed: , Khaled Mostafa Elsayed:
 Ar-CM-ViMETA: Arabic Image Captioning based on Concept Model and Vision-based Multi-Encoder Transformer Architecture. 458-465
- Abdelraouf Ishtaiwi  , Ali Mohd Ali , Ali Mohd Ali , Ahmad Al-Qerem, Yazan Alsmadi, Amjad Aldweesh, Mohammad Alauthman, Omar Alzubi, Shadi Nashwan, Awad Ramadan, Musab Al-Zghoul, Someah Alangari: , Ahmad Al-Qerem, Yazan Alsmadi, Amjad Aldweesh, Mohammad Alauthman, Omar Alzubi, Shadi Nashwan, Awad Ramadan, Musab Al-Zghoul, Someah Alangari:
 Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models. 466-482
- Nur Aliah Syahmina Mohd Nazarudin, Nor Hapiza Mohd Ariffin, Ruhaila Maskat: 
 Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction. 483-494
- Eman Aljadani, Fatmah Assiri, Areej Alshutayri: 
 Detecting Spam Reviews in Arabic by Deep Learning. 495-505
- Sumyyah Al-Hijjawi  , Abd Ghafur Ahmad, Shawkat Alkhazaleh: , Abd Ghafur Ahmad, Shawkat Alkhazaleh:
 From Neutrosophic Soft Set to Effective Neutrosophic Soft Set Generalizations and Applications. 506-519
- Fei Long: 
 The Strategy of Discriminating False Comments on the Internet by Fusing Probabilistic Topic and Word Vector Models. 520-530
- Ram Gopal Gupta  , Ankur Dumka, Bireshwar Dass Mazumdar , Ankur Dumka, Bireshwar Dass Mazumdar : :
 Improvised Software Code Comprehension Using Data Mining. 531-547
Volume 21, Number 4, July 2024
- Xiang Cheng, Pingping Zhang: 
 Enhanced soccer training simulation using progressive wasserstein GAN and termite life cycle optimization in virtual reality. 549-559
- Xue Han: 
 An improved classification model for english syntax error correction design of DL algorithm. 560-570
- Houssem Turki  , Mohamed Elleuch, Kamal M. Othman, Monji Kherallah: , Mohamed Elleuch, Kamal M. Othman, Monji Kherallah:
 Arabic text detection on traffic panels in natural scenes. 571-588
- Vinothkumar G., Manoj Kumar D.: 
 A novel adaptive ANC algorithm for removal of background noise in speech applications. 589-600
- Rongli Cai: 
 Unmanned target vehicle navigation and path planning using improved ant Colony Optimization algorithm combined with GPS/BDS. 601-613
- Fatima Zohra Boukhobza, Abdenour Hacine-Gharbi  , Khaled Rouabah: , Khaled Rouabah:
 A new facial expression recognition algorithm based on DWT feature extraction and selection. 614-626
- Laid Kenioua, Brahim Lejdel, Mohamed Abdelhamid Nedioui: 
 A comprehensive approach to combat GPS spoofing and ensure security positioning in autonomous vehicles. 627-635
- Khaled Baradieh  , Muhammad Ammirrul Atiqi Mohd Zainuri, Mohamed Kamari, Yushaizad Yusof, Huda Abdullah, Mohd Hairi Mohd Zaman, Mohd Asyraf Zulkifley: , Muhammad Ammirrul Atiqi Mohd Zainuri, Mohamed Kamari, Yushaizad Yusof, Huda Abdullah, Mohd Hairi Mohd Zaman, Mohd Asyraf Zulkifley:
 RSO based optimization of random forest classifier for fault detection and classification in photovoltaic arrays. 636-660
- Xuan-Lam Pham, Thi Thu Le: 
 Bibliometric analysis and systematic review of research on expert finding a PRISMA-guided approach. 661-674
- R. Sathiya Priya, U. Rahamathunnisa: 
 Hybridized clustering algorithm and ensemble learning for monitoring paddy crop growth analysis. 675-689
- Abhishek Kumar Pandey  , Sanjiban Sekhar Roy: , Sanjiban Sekhar Roy:
 CANBLWO: a novel hybrid approach for semantic text generation. 690-710
- Shikha Gupta, Neetu Sharma: 
 Machine learning driven threat identification to enhance FANET security using genetic algorithm. 711-722
- Yu Sun, Kepeng Gu: 
 Prediction of football players' value in the transfer market of well-known european leagues based on FIFA 19 and real-world data. 723-740
- Potu Bharath  , Dasari Venkata Lakshmi , Dasari Venkata Lakshmi : :
 Analyzing sentiments using optimized novel ensemble fuzzy and DL based approach with efficient feature selection and extraction models. 741-759
- Min Zeng: 
 Gesture recognition technology of VR piano playing teaching game based on hidden markov model. 760-772
Volume 21, Number 5, September 2024
- Fairouz Bendjamaa, Nora Taleb: 
 OntoDin: an islamic ontology of quran and hadith. 773-785
- Hemant Kumar  , Vipin Saxena: , Vipin Saxena:
 Effective test cases generation with harmony search and RBF neural network. 786-799
- Qi Zhu, Yong Peng  : :
 Semi-supervised kernel discriminative low-rank ridge regression for data classification. 800-814
- Mohammad Shehab, Rami Sihwail, Mohammad Sharif Daoud, Hani Mahmoud Almimi, Laith Abualigah: 
 Nature-inspired metaheuristic algorithms: a comprehensive review. 815-831
- Ayat Al-Hinawi, Radwan Alelaimat  : :
 Using deep learning for profitable concrete forecasting methods. 832-843
- Lilibeth Coronel  , Arnel C. Fajardo, Ruji Medina: , Arnel C. Fajardo, Ruji Medina:
 Horizontal sequence pooling technique in convolutional neural networks to optimize feature extraction for DNA sequence classification. 844-853
- Wanqing Zhang, Ruohan Huang, Luwei Ye: 
 Evaluation of emission reduction performance of power enterprises based on least squares support vector machine. 854-865
- Subhashini Kumaran, Amutha Ramachandran: 
 Image encryption using modified perturbed logistic map. 866-878
- Zahraa Al Mokhtar, Shefa A. Dawwd: 
 3D VAE video prediction model with kullback leibler loss enhancement. 879-888
- Prachi Chhabra  , Ali Abidi: , Ali Abidi:
 Curved text detection in scenic images via proposal-free panoptic segmentation and deep learning. 889-898
- Ayesha Taranum  , Jyoti Metan, Prasad Adaguru Yogegowda, Chandrashekar Krishnappa: , Jyoti Metan, Prasad Adaguru Yogegowda, Chandrashekar Krishnappa:
 Canine disease prediction using multi-directional intensity proportional pattern with correlated textural neural network. 899-914
- Yuebo Wu, Shiwei Chu, Huifang Bao, Duansong Wang, Jian Zhou: 
 Efficient image encryption via 2D logistic chaos mapping: strengthening security with pixel-level dynamics. 915-924
- Guoyan Li, Fei Wang: 
 Image object and scene recognition based on improved convolutional neural network. 925-937
- Refik Nureddin, Ismail Koç, Sait Ali Uymaz: 
 A novel crossover based discrete artificial algae algorithm for solving traveling salesman problem. 938-952
- Praveena Vasudevan, Chitra Ekambaram: 
 HYAQP: A hybrid meta-heuristic optimization model for air quality prediction using unsupervised machine learning paradigms. 953-966
Volume 21, Number 6, November 2024
- Mohammad Ahmad Alia, Adnan Hnaif, Aseel Alrawashdeh, Yousef Jaradat, Mohammad Z. Masoud, Ahmad M. Manasrah, Ahmad Alshanty: 
 Robust image watermarking using DWT, DCT, and PSO with CNN-based attack evaluation. 967-977
- Xin Wang, Yingxue Yang, Xueshuang Ding, Yantao Zhao: 
 Based on correlation analysis and k-means: an anomaly detection algorithm for seasonal time-series data. 978-986
- Shahed Nabeel Al-khateeb: 
 Forecasting the spread of viral diseases in jordan using the SARIMA statistical model. 987-995
- Emna Bouazizi, Ayman E. Khedr, Sherin Elfaioumy, Mohamed Belal: 
 Inventory optimization using data science technologies for supply chain 4.0. 996-1005
- Lubna Alkahla, Jwan Saeed, Maher Hussein: 
 Empowering ovarian cancer subtype classification with parallel swin transformers and WSI imaging. 1006-1014
- Ivan V. Stepanyan, Safa Hameed  : :
 A neuro phenotypic evolution algorithm for recognizing human motion type. 1015-1028
- Yingjuan Sun, Wanhua Li, Jingqi Xing, Bangzuo Zhang, Dongbing Pu, Qian Liu, Yinghui Sun: 
 Enhancing session-based recommendations by fusing candidate items. 1029-1042
- Yuwei Wang: 
 English-chinese bilingual teaching: A DECTMT-NBO-DMSFNN approach for design and application of machine translation technology. 1043-1053
- Hayel Khafajeh: 
 Cyberbullying detection in social networks using deep learning. 1054-1063
- Mandeep Sandhu  , Mohammad Nadeem Ahmed, Mohammad Rashid Hussain, Surender Head, Imran Mohammad Khan: , Mohammad Nadeem Ahmed, Mohammad Rashid Hussain, Surender Head, Imran Mohammad Khan:
 Protecting sensitive images with improved 6-D logistic chaotic image steganography. 1064-1073
- Zhe Zheng, Jinghua Liu, Darui Sun, Jinghui Lu, Song Qiu, Yanwei Xiong, Rui Liu, Wenpeng Cui: 
 A flexible algorithm design of spatial scalability for real-time surveillance applications. 1074-1088
- Gerardo Salazar-Salazar, Manuel Mora  , Hector A. Duran-Limon, Francisco Álvarez Rodríguez, Angel Eduardo Muñoz Zavala: , Hector A. Duran-Limon, Francisco Álvarez Rodríguez, Angel Eduardo Muñoz Zavala:
 Review of agile SDLC for big data analytics systems in the context of small organizations using scrum-XP. 1089-1110
- Someshwaran Gunasekaran  , Sarada Vivekasaran: , Sarada Vivekasaran:
 Disease prognosis of fetal heart's four-chamber and blood vessels in ultrasound images using CNN incorporated VGG 16 and enhanced DRNN. 1111-1127
- Ajith Abraham, Bineet Kumar Gupta, Satya Bhushan Verma, Archana Sachindeo Maurya, Mohammad Husain, Arshad Ali, Sami Alshmrany, Sanjay Gupta: 
 Improvement of translation accuracy for the word sense disambiguation system using novel classifier approach. 1128-1142
- Thillai Sivakavi S.  , R. I. Minu: , R. I. Minu:
 Tamil lang TSP: tamil lang transformer neural text to sign production. 1143-1154

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














