International Arab Journal of Information Technology

Papers
(The median citation count of International Arab Journal of Information Technology is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Rating the Crisis of Online Public Opinion Using a Multi-Level Index System48
A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security26
A New Two-step Ensemble Learning Model for Improving Stress Prediction of Automobile Drivers23
Performance Analysis of Efficient Spectrum Utilization in Cognitive Radio Networks by Dynamic Spectrum Access and Artificial Neuron Network Algorithms17
Crop Disease Prediction with Convolution Neural Network (CNN) Augmented With Cellular Automata11
A Modified DBSCAN Algorithm for Anomaly Detection in Time-series Data with Seasonality10
Predicting Student Enrolments and Attrition Patterns in Higher Educational Institutions using Machine Learning10
Computer Vision-based Early Fire Detection Using Enhanced Chromatic Segmentation and Optical Flow Analysis Technique10
A New Digital Signature Algorithm for Ensuring the Data Integrity in Cloud using Elliptic Curves9
Machine Learning-Based Model for Prediction of Power Consumption in Smart Grid9
Machine Learning Model for Credit Card Fraud Detection- A Comparative Analysis9
A Secure Cellular Automata Integrated Deep Learning Mechanism for Health Informatics9
Software Defined Network: Load Balancing Algorithm Design and Analysis8
The Jordanian Universities Experience in Integrating Online Learning and its Quality Assurance8
Stacknet Based Decision Fusion Classifier for Network Intrusion Detection8
The Intrusion Detection System by Deep Learning Methods: Issues and Challenges8
Instagram Post Popularity Trend Analysis and Prediction using Hashtag, Image Assessment, and User History Features8
IoT Security Using AES Encryption Technology based ESP32 Platform7
A Genetic Algorithm based Domain Adaptation Framework for Classification of Disaster Topic Text Tweets7
Heart Disease Classification for Early Diagnosis based on Adaptive Hoeffding Tree Algorithm in IoMT Data7
Improved YOLOv3-tiny for Silhouette Detection Using Regularisation Techniques7
Highly Accurate Spam Detection with the Help of Feature Selection and Data Transformation6
Emotion Recognition based on EEG Signals in Response to Bilingual Music Tracks6
Polynomial Based Fuzzy Vault Technique for Template Security in Fingerprint Biometrics6
An Architecture of IoT-Aware Healthcare Smart System by Leveraging Machine Learning6
Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network6
Wrapper based Feature Selection using Integrative Teaching Learning Based Optimization Algorithm6
Sentiment Analysis System using Hybrid Word Embeddings with Convolutional Recurrent Neural Network5
Semantic Similarity Analysis for Corpus Development and Paraphrase Detection in Arabic5
Applying Deep Convolutional Neural Network (DCNN) Algorithm in the Cloud Autonomous Vehicles Traffic Model5
A Sentiment Analysis System for the Hindi Language by Integrating Gated Recurrent Unit with Genetic Algorithm5
A Hybrid Deep Learning Based Assist System for Detection and Classification of Breast Cancer from Mammogram Images5
Support Vector Machine with Information Gain Based Classification for Credit Card Fraud Detection System5
Key Parts of Transmission Line Detection Using Improved YOLO v35
Supervised Fuzzy C-Means Techniques to Solve the Capacitated Vehicle Routing Problem5
A Distributed Framework of Autonomous Drones for Planning and Execution of Relief Operations during Flood Situations5
Detection of Bundle Branch Block using Higher Order Statistics and Temporal Features5
A Comparative Study of Different Pre-Trained Deep Learning Models and Custom CNN for Pancreatic Tumor Detection5
Machine Learning in OpenFlow Network: Comparative Analysis of DDoS Detection Techniques5
A Novel Recurrent Neural Networks Architecture for Behavior Analysis5
Software Metrics for Reusability of Component Based Software System: A Review5
An Efficient Intrusion Detection Framework Based on Embedding Feature Selection and Ensemble Learning Technique4
Deep Learning Shape Trajectories for Isolated Word Sign Language Recognition4
Machine Learning Models for Statistical Analysis4
LoRaWAN Energy Optimization with Security Consideration4
Recurrence Quantification Analysis of Glottal Signal as non Linear Tool for Pathological Voice Assessment and Classification4
Hybrid FiST_CNN approach for Feature Extraction for Vision-Based Indian Sign Language Recognition4
A Real-Time Business Analysis Framework Using Virtual Data Warehouse4
Map Matching Algorithm: Empirical Review Based on Indian Open Street Map Road Network Data3
Sørensen-Dice Similarity Indexing based Weighted Iterative Clustering for Big Data Analytics3
Measure of Singular Value Decomposition (M-SVD) based Quality Assessment for Medical Images with Degradation3
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images3
Arabic Quran Verses Authentication Using Deep Learning and Word Embeddings3
Improved Intrusion Detection Algorithm based on TLBO and GA Algorithms3
Speech Synthesis System for the Holy Quran Recitation3
Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System3
Skin Lesion Segmentation in Dermoscopy Imagery3
A New Approach for Detecting Eosinophils in the Gastrointestinal Tract and Diagnosing Eosinophilic Colitis3
A Deep Learning Approach for the Romanized Tunisian Dialect Identification3
Human Activity Recognition Based on Transfer Learning with Spatio-Temporal Representations3
Analyzing the Behavior of Multiple Dimensionality Reduction Algorithms to Obtain Better Accuracy using Benchmark KDD CUP Dataset3
An Investigative Analysis on Finding Patterns in Co-Author and Co-Institution Networks for LIDAR Research3
Random Walk Generation and Classification Within an Online Learning Platform3
Automated Classification of Whole-Body SPECT Bone Scan Images with VGG-Based Deep Networks3
Towards Personalized User Training for Secure Use of Information Systems3
Digital Forensics Techniques and Trends: A Review3
Analyzing the Effect of Driving Speed on the Performance of Roundabouts3
Parallelization of Frequent Itemset Mining Methods with FP-tree: An Experiment with PrePost+ Algorithm3
An Efficient Ensemble Architecture for Privacy and Security of Electronic Medical Records3
Cost-Aware Ant Colony Optimization Based model for Load Balancing in Cloud Computing3
Encryption Based on Cellular Automata for Wireless Devices in IoT Environment3
Credit-card Fraud Detection System using Neural Networks3
RoboGuard: Enhancing Robotic System Security with Ensemble Learning3
Parallel Scalable Approximate Matching Algorithm for Network Intrusion Detection Systems2
Architecture Style Selection using Statistics of Quality Attributes to Reduce Production Costs2
Retina Disorders Classification via OCT Scan: A Comparative Study between Self-Supervised Learning and Transfer Learning2
Reliability-Aware: Task Scheduling in Cloud Computing Using Multi-Agent Reinforcement Learning Algorithm and Neural Fitted Q2
IoT Based Technique for Network Packet Analyzer2
A Novel Binary Search Tree Method to Find an Item Using Scaling2
Assesing The Stability And Selection Performance Of Feature Selection Methods Under Different Data Complexity2
A Heuristic Tool for Measuring Software Quality Using Program Language Standards2
A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption2
Smoke Detection Algorithm based on Negative Sample Mining2
Solving Point Coverage Problem in Wireless Sensor Networks Using Whale Optimization Algorithm2
Usability Study of Enhanced Salat Learning Approach using Motion Recognition System2
A Personalized Recommendation for Web API Discovery in Social Web of Things2
Human Facial Emotion Recognition using Deep Neural Networks2
The Role of Artificial Intelligence Abilities in Library Services2
Intensification and Interpretation of Performance in 5G adopting Millimeter Wave: A Survey & Future Research Direction2
Glaucoma Detection using Tetragonal Local Octa Patterns and SVM from Retinal Images2
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm2
An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools2
An Efficient Parallel Version of Dynamic Multi-Objective Evolutionary Algorithm2
IOT-Pattern-As-a-Service Model for Delay Sensitive IOT Integrated Applications2
A Multi-Group Structural Equation Modeling For Assessing Behavioral Intention of Using Mobile Cloud Computing-The Case of Jordanian Universities During The Covid19 Pandemic2
Survey on Software Changes: Reasons and Remedies2
Discretization Based Framework to Improve the Recommendation Quality2
Optimal Image Based Information Hiding with One-dimensional Chaotic Systems and Dynamic Programming2
Modeling of a PV Panel and application of Maximum Power Point Tracking Command based on ANN2
Coverless Data Hiding in VoIP based on DNA Steganography with Authentication2
Reinforcement Energy Efficient ant Colony Optimization of Mobile Ad Hoc Multipath Routing Performance Enhancement2
An Ensemble-based Supervised Machine Learning Framework for Android Ransomware Detection2
F0 Modeling for Isarn Speech Synthesis using Deep Neural Networks and Syllable-level Feature Representation2
A Topic-Specific Web Crawler using Deep Convolutional Networks2
Multi-Pose Facial Expression Recognition Using Hybrid Deep Learning Model with Improved Variant of Gravitational Search Algorithm2
Spider Monkey Optimization Algorithm for Load Balancing in Cloud Computing Environments2
AFTM - Agent Based Fault Tolerance Manager in Cloud Environment2
Echo State Network Optimization using Hybrid-Structure Based Gravitational Search Algorithm with Square Quadratic Programming for Time Series Prediction2
Adaptive Optimization for Optimal Mobile Sink Placement in Wireless Sensor Networks1
LWE Based Quantum-Resistant Pseudo-Random Number Generator1
A Rule-Induction Approach for Building an Arabic Language Interfaces to Databases1
A Fusion Approach Based on HOG and Adaboost Algorithm for Face Detection under Low- Resolution Images1
XAPP: An Implementation of SAX-Based Method for Mapping XML Document to and from a Relational Database1
Analysis of Video Steganography in Military Applications on Cloud1
The Critical Feature Selection Approach using Ensemble Meta-Based Models to Predict Academic Performances1
Latent Fingerprint Recognition using Hybrid Ant Colony Optimization and Cuckoo Search1
Generating Embedding Features Using Deep Learning for Ethnics Recognition1
A Novel Approach of Clustering Documents: Minimizing Computational Complexities in Accessing Database Systems1
A Dynamic Particle Swarm Optimisation and Fuzzy Clustering Means Algorithm for Segmentation of Multimodal Brain Magnetic Resonance Image Data1
An ML-Based Classification Scheme for Analyzing the Social Network Reviews of Yemeni People1
Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud1
GovdeTurk: A Novel Turkish Natural Language Processing Tool for Stemming, Morphological Labelling and Verb Negation1
Analysis of TCP Issues and Their Possible Solutions in the Internet of Things1
Performance Comparison of Multiple ANN Optimizer on IoT-enabled Sensor Fire Dataset1
New Language Models for Spelling Correction1
VoxCeleb1: Speaker Age-Group Classification using Probabilistic Neural Network1
An Improved Iris Localization Method1
Text Mining Approaches for Dependent Bug Report Assembly and Severity Prediction1
Designing an Intelligent System to Detect Stress Levels During Driving1
Privacy Preserving Authenticated Key Agreement based on Bilinear Pairing for uHealthcare1
SAFRank: Multi-Agent based Approach for Internet Services Selection1
Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images1
A Multi-Population Genetic Algorithm for Adaptive Qos-Aware Service Composition in Fog-Iot Healthcare Environment1
Malaria Parasite Detection on Microscopic Blood Smear Images with Integrated Deep Learning Algorithms1
Driving Signature Analysis for Auto-Theft Recovery1
Classification of Legislations using Deep Learning1
An Anonymous Identity-based With Bilateral Protocol for Smart Grid1
Utilizing Artificial Bee Colony Algorithm as Feature Selection Method in Arabic Text Classification1
A Method of Extracting Malware Features Based on Gini Impurity Increment and Improved TF-IDF1
Development and Implementation of a Video Watermarking Method Based on DCT Transform1
Compatibility Themed Solution of the Vehicle Routing Problem on the Heterogeneous Fleet1
Estimation Model for Enhanced Predictive Object Point Metric in OO Software Size Estimation Using Deep Learning1
A Novel Energy Efficient Harvesting Technique for SDWSN using RF Transmitters with MISO Beamforming1
Exploring the Performance of Farasa and CAMeL Taggers for Arabic Dialect Tweets1
AVL Based Settlement Algorithm and Reservation System for Smart Parking Systems in IoT-based Smart Cities1
Semantic Interoperability Model in Healthcare Internet of Things Using Healthcare Sign Description Framework1
Robust Hearing-Impaired Speaker Recognition from Speech using Deep Learning Networks in Native Language1
Mining Android Bytecodes through the Eyes of Gabor Filters for Detecting Malware1
A Novel Machine-Learning Framework-based on LBP and GLCM Approaches for CBIR System1
Secure Blockchain-Based Electronic Voting Mechanism1
Context Aware Mobile Application Pre-Launching Model using KNN Classifier1
An Efficient Intrusion Detection System by Using Behaviour Profiling and Statistical Approach Model1
The Delay Measurement and Analysis of Unreachable Hosts of Internet1
Image Segmentation with Multi-feature Fusion in Compressed Domain based on Region-Based Graph1
Speaker Naming in Arabic TV Programs1
FaceSwap based DeepFakes Detection1
MiNB: Minority Sensitive Naïve Bayesian Algorithm for Multi-Class Classification of Unbalanced Data1
Lightweight Secure MQTT for Mobility Enabled e-health Internet of Things1
Application of Intuitionistic Fuzzy Evaluation Method in Aircraft Cockpit Display Ergonomics1
Automatic Topics Segmentation for News Video by Clustering of Histogram of Orientation Gradients Faces1
Lean Database: An Interdisciplinary Perspective Combining Lean Thinking and Technology1
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS1
Headnote Prediction Using Machine Learning1
An Adaptive Traffic Lights System using Machine Learning1
A Novel Technique of Noise Cancellation based on Stationary Bionic Wavelet Transform and WATV: Application for ECG Denoising1
Compact Tree Structures for Mining High Utility Itemsets1
Environmental Noise Adaptable Hearing Aid using Deep Learning1
Hybrid User Acceptance Test Procedure to Improve the Software Quality1
A Schema-Free Instance Matching Algorithm Based on Virtual Document Similarity1
Generating Sense Inventories for Ambiguous Arabic Words1
A Self-Healing Model for QoS-aware Web Service Composition1
Algebraic Supports and New Forms of the Hidden Discrete Logarithm Problem for Post-quantum Public-key Cryptoschemes1
Deep Learning Based Hand Wrist Segmentation using Mask R-CNN1
Intelligent Recognition of Gas-Liquid Two-Phase Flow Based on Optical Image1
Secure of Transmission Systems in the Visible Range of Light with the Power Line Communication Interface1
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering1
Transfer Learning for Feature Dimensionality Reduction1
On Rapid Transitioning to Online Learning Under COVID-19: Challenges and Solutions at Al al-Bayt University1
Effects of Using Arabic Web Pages in Building Rank Estimation Algorithm for Google Search Engine Results Page1
Ciphertext-Only Attack on RSA Using Lattice Basis Reduction1
Heterogeneous Feature Analysis on Twitter Data Set for Identification of Spam Messages1
GPS Receiver Position Augmentation Using Correntropy Kalman Filter in Low Latitude Terrain1
Automotive Embedded Systems-Model Based Approach Review1
Research on the Similarity between Nodes with Hypernymy/Hyponymy Relations based on IC and Taxonomical Structure1
Improved Superpixels Generation Algorithm for Qualified Graph-Based Technique1
A New Approach for Textual Password Hardening Using Keystroke Latency Times1
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things1
Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions1
Software Quality Assessment Approach using Analytical Hierarchical Model: Applied in SMEs0
test0
0
Half-Duplex and Full-Duplex Performance Comparison for Different Fading Channel Using HMR Protocol in MIMO Technology0
A Bayesian Network-based Uncertainty Modeling (BNUM) to Analyze and Predict Next Optimal Moves in Given Game Scenario0
MCDM and FaaS to Automate the Eligibility of Business Rules in the Decision-Making Task during Business Processes0
0
Transmit and Receive Antenna Selection Based Resource Allocation for Self-Backhaul 5G Massive MIMO HetNets0
Exact Algorithm for Batch Scheduling on Unrelated Machine0
Evaluation Model of Athletes’ Lower Extremity Training Ability Based on LSTM Algorithm0
0
Nature-Inspired Metaheuristic Algorithms: A Comprehensive Review0
Disease Prognosis of Fetal Heart’s Four-Chamber and Blood Vessels in Ultrasound Images Using CNN Incorporated VGG 16 and Enhanced DRNN0
0
A Novel Adaptive ANC Algorithm for Removal of Background Noise in Speech Applications0
Multichannel Based IoT Malware Detection System Using System Calls and Opcode Sequences0
Text Summarization Technique for Punjabi Language Using Neural Networks0
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis0
0
Traceable Signatures using Lattices0
FPGA based Flexible Implementation of Light Weight Inference on Deep Convolutional Neural Networks0
Analysis of QA System Behavior against Context and Question Changes0
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques0
Experimental Modeling of the Residual Energy of a Rechargeable Battery-Powered Node in Wireless Networks0
Choosing Decision Tree-Based Boundary Patterns in The Intrusion Detection Systems with Large Data Sets0
0
Gabor and Maximum Response Filters with Random Forest Classifier for Face Recognition in the Wild0
0
User-Centric Adaptive Password Policies to Combat Password Fatigue0
A Comparative Study on Deep Learning and Machine Learning Models for Human Action Recognition in Aerial Videos0
Joint Optimization Offloading Strategy of Execution Time and Energy Consumption of Mobile Edge Computing0
Semi-Supervised Kernel Discriminative Low-Rank Ridge Regression for Data Classification0
An Effective Fault-Tolerance Technique in Web Services: An Approach Based on Hybrid Optimization Algorithm of PSO and Cuckoo Search0
Empowering Ovarian Cancer Subtype Classification with Parallel Swin Transformers and WSI Imaging0
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks0
Arabic Text Detection on Traffic Panels in Natural Scenes0
Dictionary Based Arabic Text Compression and Encryption Utilizing Two-Dimensional Random Binary Shuffling Operations0
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction0
Space-time Templates based Features for Patient Activity Recognition0
Multi-Spectral Hybrid Invariant Moments Fusion Technique for Face Identification0
DWT and LBP Map Based Feature Descriptors for Face Recognition in Harsh Light Variations0
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network0
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network0
Densely Convolutional Networks For Breast Cancer Classification With Multi-modal Image Fusion0
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview0
0
A Cognitive Approach To Predict the Multi-Directional Trajectory of Pedestrians0
A study on Two-Stage Mixed Attribute Data Clustering Based on Density Peaks0
A New Image Encryption Scheme Using Dual Chaotic Map Synchronization0
A Novel Codebook Generation by Smart Fruit Fly Algorithm based on Exponential Flight0
A Novel Resource Scheduler for Resource Allocation and Scheduling in Big Data Using Hybrid Optimization Algorithm at Cloud Environment0
Hybridized Clustering Algorithm and Ensemble Learning for Monitoring Paddy Crop Growth Analysis0
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics0
Tamil Lang TSP: Tamil Lang Transformer Neural Text to Sign Production0
On Satellite Imagery of Land Cover Classification for Agricultural Development0
Inventory Optimization Using Data Science Technologies for Supply Chain 4.00
Elitist strategy of Genetic Algorithms for Writing Tang Poetry0
Enhanced Soccer Training Simulation Using Progressive Wasserstein GAN and Termite Life Cycle Optimization in Virtual Reality0
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*0
Modified Cuckoo Search Algorithm for Motion Vector Estimation0
An Improved Quantile-Point-Based Evolutionary Segmentation Representation Method of Financial Time Series0
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning0
0.080410957336426