International Arab Journal of Information Technology

Papers
(The median citation count of International Arab Journal of Information Technology is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Rating the Crisis of Online Public Opinion Using a Multi-Level Index System44
DoS and DDoS Attack Detection Using Deep Learning and IDS29
A New Two-step Ensemble Learning Model for Improving Stress Prediction of Automobile Drivers23
Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning21
Enhanced Android Malware Detection and Family Classification, using Conversation-level Network Traffic Features18
A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security18
Performance Analysis of Efficient Spectrum Utilization in Cognitive Radio Networks by Dynamic Spectrum Access and Artificial Neuron Network Algorithms17
Computer Vision-based Early Fire Detection Using Enhanced Chromatic Segmentation and Optical Flow Analysis Technique10
Intelligent Association Classification Technique for Phishing Website Detection9
A Deep Learning based Arabic Script Recognition System: Benchmark on KHAT9
Software Defined Network: Load Balancing Algorithm Design and Analysis8
A New Digital Signature Algorithm for Ensuring the Data Integrity in Cloud using Elliptic Curves8
Persian Handwritten Digit Recognition Using Combination of Convolutional Neural Network and Support Vector Machine Methods7
Machine Learning-Based Model for Prediction of Power Consumption in Smart Grid7
A Modified DBSCAN Algorithm for Anomaly Detection in Time-series Data with Seasonality7
Predicting Student Enrolments and Attrition Patterns in Higher Educational Institutions using Machine Learning7
Wrapper based Feature Selection using Integrative Teaching Learning Based Optimization Algorithm6
The Jordanian Universities Experience in Integrating Online Learning and its Quality Assurance6
Instagram Post Popularity Trend Analysis and Prediction using Hashtag, Image Assessment, and User History Features6
An Architecture of IoT-Aware Healthcare Smart System by Leveraging Machine Learning6
Crop Disease Prediction with Convolution Neural Network (CNN) Augmented With Cellular Automata6
A Secure Cellular Automata Integrated Deep Learning Mechanism for Health Informatics6
The Intrusion Detection System by Deep Learning Methods: Issues and Challenges6
A Sentiment Analysis System for the Hindi Language by Integrating Gated Recurrent Unit with Genetic Algorithm5
A Deep Learning Based Prediction of Arabic Manuscripts Handwriting Style5
LoRaWAN Energy Optimization with Security Consideration5
Machine Learning in OpenFlow Network: Comparative Analysis of DDoS Detection Techniques5
Applying Deep Convolutional Neural Network (DCNN) Algorithm in the Cloud Autonomous Vehicles Traffic Model5
An Efficient Intrusion Detection Framework Based on Embedding Feature Selection and Ensemble Learning Technique5
A Novel Recurrent Neural Networks Architecture for Behavior Analysis5
A Hybrid Deep Learning Based Assist System for Detection and Classification of Breast Cancer from Mammogram Images5
Detection of Bundle Branch Block using Higher Order Statistics and Temporal Features5
Supervised Fuzzy C-Means Techniques to Solve the Capacitated Vehicle Routing Problem5
A Distributed Framework of Autonomous Drones for Planning and Execution of Relief Operations during Flood Situations5
Stacknet Based Decision Fusion Classifier for Network Intrusion Detection5
IoT Security Using AES Encryption Technology based ESP32 Platform5
A Genetic Algorithm based Domain Adaptation Framework for Classification of Disaster Topic Text Tweets5
Emotion Recognition based on EEG Signals in Response to Bilingual Music Tracks5
A Sparse Topic Model for Bursty Topic Discovery in Social Networks4
Streaming Video Classification Using Machine Learning4
Machine Learning Model for Credit Card Fraud Detection- A Comparative Analysis4
Improved YOLOv3-tiny for Silhouette Detection Using Regularisation Techniques4
Sentiment Analysis System using Hybrid Word Embeddings with Convolutional Recurrent Neural Network4
Recurrence Quantification Analysis of Glottal Signal as non Linear Tool for Pathological Voice Assessment and Classification4
Text Similarity Computation Model for Identifying Rumor Based on Bayesian Network in Microblog4
Hybrid FiST_CNN approach for Feature Extraction for Vision-Based Indian Sign Language Recognition4
Polynomial Based Fuzzy Vault Technique for Template Security in Fingerprint Biometrics4
Semantic Similarity Analysis for Corpus Development and Paraphrase Detection in Arabic4
Finger Knuckle Print Recognition using MMDA with Fuzzy Vault3
Skin Lesion Segmentation in Dermoscopy Imagery3
Discretization Based Framework to Improve the Recommendation Quality3
Improved Streaming Quotient Filter: A Duplicate Detection Approach for Data Streams3
Support Vector Machine with Information Gain Based Classification for Credit Card Fraud Detection System3
Deep Learning Shape Trajectories for Isolated Word Sign Language Recognition3
Cost-Aware Ant Colony Optimization Based model for Load Balancing in Cloud Computing3
Improved Intrusion Detection Algorithm based on TLBO and GA Algorithms3
Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network3
Highly Accurate Spam Detection with the Help of Feature Selection and Data Transformation3
A Novel Feature Selection Method Based on Maximum Likelihood Logistic Regression for Imbalanced Learning in Software Defect Prediction3
Swarm Intelligence Approach to QRS Detection3
Measure of Singular Value Decomposition (M-SVD) based Quality Assessment for Medical Images with Degradation3
Key Parts of Transmission Line Detection Using Improved YOLO v33
Random Walk Generation and Classification Within an Online Learning Platform3
Encryption Based on Cellular Automata for Wireless Devices in IoT Environment3
Incorporating Intelligence for Overtaking Moving Threatening Obstacles3
Software Metrics for Reusability of Component Based Software System: A Review3
Map Matching Algorithm: Empirical Review Based on Indian Open Street Map Road Network Data3
On Detection and Prevention of Zero-Day Attack Using Cuckoo Sandbox in Software-Defined Networks3
A Real-Time Business Analysis Framework Using Virtual Data Warehouse3
Human Activity Recognition Based on Transfer Learning with Spatio-Temporal Representations3
Arabic Quran Verses Authentication Using Deep Learning and Word Embeddings3
Speech Synthesis System for the Holy Quran Recitation3
Usability Study of Enhanced Salat Learning Approach using Motion Recognition System2
Reinforcement Energy Efficient ant Colony Optimization of Mobile Ad Hoc Multipath Routing Performance Enhancement2
Conceptual Persian Text Summarizer: A New Model in Continuous Vector Space2
Assesing The Stability And Selection Performance Of Feature Selection Methods Under Different Data Complexity2
F0 Modeling for Isarn Speech Synthesis using Deep Neural Networks and Syllable-level Feature Representation2
Saliency Cuts: Salient Region Extraction based on Local Adaptive Thresholding for Image Information Recognition of the Visually Impaired2
Multi-Pose Facial Expression Recognition Using Hybrid Deep Learning Model with Improved Variant of Gravitational Search Algorithm2
A Multi-Population Genetic Algorithm for Adaptive Qos-Aware Service Composition in Fog-Iot Healthcare Environment2
An Efficient Ensemble Architecture for Privacy and Security of Electronic Medical Records2
A Concept-based Sentiment Analysis Approach for Arabic2
Enhanced Latent Semantic Indexing Using Cosine Similarity Measures for Medical Application2
The Performance of Penalty Methods on Tree-Seed Algorithm for Numerical Constrained Optimization Problems2
Generation of Chaotic Signal for Scrambling Matrix Content2
A New Approach for Detecting Eosinophils in the Gastrointestinal Tract and Diagnosing Eosinophilic Colitis2
A Personalized Recommendation for Web API Discovery in Social Web of Things2
Intensification and Interpretation of Performance in 5G adopting Millimeter Wave: A Survey & Future Research Direction2
A Comparative Study of Different Pre-Trained Deep Learning Models and Custom CNN for Pancreatic Tumor Detection2
Analyzing the Effect of Driving Speed on the Performance of Roundabouts2
Otsu’s Thresholding Method Based on Plane Intercept Histogram and Geometric Analysis2
A Deep Learning Approach for the Romanized Tunisian Dialect Identification2
A Heuristic Tool for Measuring Software Quality Using Program Language Standards2
An Investigative Analysis on Finding Patterns in Co-Author and Co-Institution Networks for LIDAR Research2
Heart Disease Classification for Early Diagnosis based on Adaptive Hoeffding Tree Algorithm in IoMT Data2
Analyzing the Behavior of Multiple Dimensionality Reduction Algorithms to Obtain Better Accuracy using Benchmark KDD CUP Dataset2
Solving Point Coverage Problem in Wireless Sensor Networks Using Whale Optimization Algorithm2
An Efficient Intrusion Detection System by Using Behaviour Profiling and Statistical Approach Model2
Survey on Software Changes: Reasons and Remedies2
Architecture Style Selection using Statistics of Quality Attributes to Reduce Production Costs2
Optimal Image Based Information Hiding with One-dimensional Chaotic Systems and Dynamic Programming2
Reliability-Aware: Task Scheduling in Cloud Computing Using Multi-Agent Reinforcement Learning Algorithm and Neural Fitted Q2
An Ensemble-based Supervised Machine Learning Framework for Android Ransomware Detection2
Glaucoma Detection using Tetragonal Local Octa Patterns and SVM from Retinal Images2
IoT Based Technique for Network Packet Analyzer2
An Efficient Parallel Version of Dynamic Multi-Objective Evolutionary Algorithm2
Spider Monkey Optimization Algorithm for Load Balancing in Cloud Computing Environments2
Incorporating Reverse Search for Friend Recommendation with Random Walk2
Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System2
Ontology-Based Transformation and Verification of UML Class Model2
Echo State Network Optimization using Hybrid-Structure Based Gravitational Search Algorithm with Square Quadratic Programming for Time Series Prediction2
IOT-Pattern-As-a-Service Model for Delay Sensitive IOT Integrated Applications2
Parallel Scalable Approximate Matching Algorithm for Network Intrusion Detection Systems2
Compatibility Themed Solution of the Vehicle Routing Problem on the Heterogeneous Fleet1
GPS Receiver Position Augmentation Using Correntropy Kalman Filter in Low Latitude Terrain1
Robust Hearing-Impaired Speaker Recognition from Speech using Deep Learning Networks in Native Language1
A Novel Technique of Noise Cancellation based on Stationary Bionic Wavelet Transform and WATV: Application for ECG Denoising1
MiNB: Minority Sensitive Naïve Bayesian Algorithm for Multi-Class Classification of Unbalanced Data1
Development and Implementation of a Video Watermarking Method Based on DCT Transform1
Semantic Interoperability Model in Healthcare Internet of Things Using Healthcare Sign Description Framework1
A Fusion Approach Based on HOG and Adaboost Algorithm for Face Detection under Low- Resolution Images1
Coverless Data Hiding in VoIP based on DNA Steganography with Authentication1
Analysis of Video Steganography in Military Applications on Cloud1
Sørensen-Dice Similarity Indexing based Weighted Iterative Clustering for Big Data Analytics1
Default Prediction Model: The Significant Role of Data Engineering in the Quality of Outcomes1
Heterogeneous Feature Analysis on Twitter Data Set for Identification of Spam Messages1
Discovery of Arbitrary-Shapes Clusters Using DENCLUE Algorithm1
Transfer Learning for Feature Dimensionality Reduction1
On Rapid Transitioning to Online Learning Under COVID-19: Challenges and Solutions at Al al-Bayt University1
An Improved Iris Localization Method1
Intelligent Recognition of Gas-Liquid Two-Phase Flow Based on Optical Image1
Secure Blockchain-Based Electronic Voting Mechanism1
RoboGuard: Enhancing Robotic System Security with Ensemble Learning1
Ciphertext-Only Attack on RSA Using Lattice Basis Reduction1
Human Facial Emotion Recognition using Deep Neural Networks1
Identification of Ischemic Stroke by Marker Controlled Watershed Segmentation and Fearture Extraction1
A Schema-Free Instance Matching Algorithm Based on Virtual Document Similarity1
Exploring the Performance of Farasa and CAMeL Taggers for Arabic Dialect Tweets1
The Critical Feature Selection Approach using Ensemble Meta-Based Models to Predict Academic Performances1
Environmental Noise Adaptable Hearing Aid using Deep Learning1
A Rule-Induction Approach for Building an Arabic Language Interfaces to Databases1
Automated Classification of Whole-Body SPECT Bone Scan Images with VGG-Based Deep Networks1
The Role of Artificial Intelligence Abilities in Library Services1
A Self-Healing Model for QoS-aware Web Service Composition1
Mitigating Insider Threats on the Edge: A Knowledgebase Approach1
Latent Fingerprint Recognition using Hybrid Ant Colony Optimization and Cuckoo Search1
Robotic Path Planning and Fuzzy Neural Networks1
A Fast High Precision Skew Angle Estimation of Digitized Documents1
Modeling of a PV Panel and application of Maximum Power Point Tracking Command based on ANN1
Generating Sense Inventories for Ambiguous Arabic Words1
Smoke Detection Algorithm based on Negative Sample Mining1
Algebraic Supports and New Forms of the Hidden Discrete Logarithm Problem for Post-quantum Public-key Cryptoschemes1
AFTM - Agent Based Fault Tolerance Manager in Cloud Environment1
Context Aware Mobile Application Pre-Launching Model using KNN Classifier1
A Multi-Group Structural Equation Modeling For Assessing Behavioral Intention of Using Mobile Cloud Computing-The Case of Jordanian Universities During The Covid19 Pandemic1
Automotive Embedded Systems-Model Based Approach Review1
Image Segmentation with Multi-feature Fusion in Compressed Domain based on Region-Based Graph1
Speaker Naming in Arabic TV Programs1
Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions1
VoxCeleb1: Speaker Age-Group Classification using Probabilistic Neural Network1
Hybrid User Acceptance Test Procedure to Improve the Software Quality1
A Method of Extracting Malware Features Based on Gini Impurity Increment and Improved TF-IDF1
An Adaptive Traffic Lights System using Machine Learning1
An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools1
Compact Tree Structures for Mining High Utility Itemsets1
An ML-Based Classification Scheme for Analyzing the Social Network Reviews of Yemeni People1
Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud1
Privacy Preserving Authenticated Key Agreement based on Bilinear Pairing for uHealthcare1
Retina Disorders Classification via OCT Scan: A Comparative Study between Self-Supervised Learning and Transfer Learning1
A Dynamic Particle Swarm Optimisation and Fuzzy Clustering Means Algorithm for Segmentation of Multimodal Brain Magnetic Resonance Image Data1
Classification of Legislations using Deep Learning1
A Novel Energy Efficient Harvesting Technique for SDWSN using RF Transmitters with MISO Beamforming1
An Improved Framework for Modelling Data Warehouse Systems Using UML Profile1
Estimation Model for Enhanced Predictive Object Point Metric in OO Software Size Estimation Using Deep Learning1
A Novel Approach of Clustering Documents: Minimizing Computational Complexities in Accessing Database Systems1
AVL Based Settlement Algorithm and Reservation System for Smart Parking Systems in IoT-based Smart Cities1
Effects of Using Arabic Web Pages in Building Rank Estimation Algorithm for Google Search Engine Results Page1
An Enhanced Corpus for Arabic Newspapers Comments1
Designing an Intelligent System to Detect Stress Levels During Driving1
Performance Comparison of Multiple ANN Optimizer on IoT-enabled Sensor Fire Dataset1
Text Summarization Technique for Punjabi Language Using Neural Networks1
The Delay Measurement and Analysis of Unreachable Hosts of Internet1
Research on the Similarity between Nodes with Hypernymy/Hyponymy Relations based on IC and Taxonomical Structure1
Headnote Prediction Using Machine Learning1
SAFRank: Multi-Agent based Approach for Internet Services Selection1
Towards Personalized User Training for Secure Use of Information Systems1
Parallelization of Frequent Itemset Mining Methods with FP-tree: An Experiment with PrePost+ Algorithm1
Machine Learning Models for Statistical Analysis1
Generating Embedding Features Using Deep Learning for Ethnics Recognition1
Automatic Topics Segmentation for News Video by Clustering of Histogram of Orientation Gradients Faces1
Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images1
Analysis of TCP Issues and Their Possible Solutions in the Internet of Things0
Maximizing the Area Spanned by the Optical SNR of the 5G Using Digital Modulators and Filters0
Optimization and Comparative Analysis of Quarter-Circular Slotted Microstrip Patch Antenna Using Particle Swarm and Fruit Fly Algorithms0
0
A Cognitive Approach To Predict the Multi-Directional Trajectory of Pedestrians0
0
0
Experimental Modeling of the Residual Energy of a Rechargeable Battery-Powered Node in Wireless Networks0
Deep Learning Based Hand Wrist Segmentation using Mask R-CNN0
0
User-Centric Adaptive Password Policies to Combat Password Fatigue0
An Effective Fault-Tolerance Technique in Web Services: An Approach Based on Hybrid Optimization Algorithm of PSO and Cuckoo Search0
MIRNA Adaptive 3D Game to assist children's Distance Learning Difficulties Design and Teachers Intention to use0
FaceSwap based DeepFakes Detection0
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques0
An Improved Quantile-Point-Based Evolutionary Segmentation Representation Method of Financial Time Series0
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*0
DWT and LBP Map Based Feature Descriptors for Face Recognition in Harsh Light Variations0
A Comparative Study on Deep Learning and Machine Learning Models for Human Action Recognition in Aerial Videos0
0
Novel Turkish Sentiment Analysis System using ConvNet0
On Satellite Imagery of Land Cover Classification for Agricultural Development0
Genetic Algorithm with Random and Memory Immigrant Strategies for Solving Dynamic Load Balanced Clustering Problem in Wireless Sensor Networks0
Multi-Spectral Hybrid Invariant Moments Fusion Technique for Face Identification0
Mining Android Bytecodes through the Eyes of Gabor Filters for Detecting Malware0
A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption0
ANN Based Execution Time Prediction Model and Assessment of Input Parameters through ISM0
A study on Two-Stage Mixed Attribute Data Clustering Based on Density Peaks0
Transmit and Receive Antenna Selection Based Resource Allocation for Self-Backhaul 5G Massive MIMO HetNets0
Query Authentication of Outsourced Spatial Database0
A Novel Resource Scheduler for Resource Allocation and Scheduling in Big Data Using Hybrid Optimization Algorithm at Cloud Environment0
Elitist strategy of Genetic Algorithms for Writing Tang Poetry0
Joint Optimization Offloading Strategy of Execution Time and Energy Consumption of Mobile Edge Computing0
Dictionary Based Arabic Text Compression and Encryption Utilizing Two-Dimensional Random Binary Shuffling Operations0
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview0
New Language Models for Spelling Correction0
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis0
Space-time Templates based Features for Patient Activity Recognition0
A Novel Codebook Generation by Smart Fruit Fly Algorithm based on Exponential Flight0
A Bayesian Network-based Uncertainty Modeling (BNUM) to Analyze and Predict Next Optimal Moves in Given Game Scenario0
An Effective Management Model for Data Caching in MANET Environment0
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images0
0
A New Approach to Automatically Find and Fix Erroneous Labels in Dependency Parsing Treebanks0
0
MCDM and FaaS to Automate the Eligibility of Business Rules in the Decision-Making Task during Business Processes0
0
Gabor and Maximum Response Filters with Random Forest Classifier for Face Recognition in the Wild0
Modified Cuckoo Search Algorithm for Motion Vector Estimation0
A New Approach for Textual Password Hardening Using Keystroke Latency Times0
0
Design and Implementation of Inter-operable and Secure Agent Migration Protocol0
Multichannel Based IoT Malware Detection System Using System Calls and Opcode Sequences0
Model Transformations Carried by the Traceability Framework for Enterprises in Software Industry0
Secure of Transmission Systems in the Visible Range of Light with the Power Line Communication Interface0
test0
Traceable Signatures using Lattices0
Exact Algorithm for Batch Scheduling on Unrelated Machine0
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks0
0.076458930969238