International Arab Journal of Information Technology

Papers
(The TQCC of International Arab Journal of Information Technology is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Rating the Crisis of Online Public Opinion Using a Multi-Level Index System44
DoS and DDoS Attack Detection Using Deep Learning and IDS29
A New Two-step Ensemble Learning Model for Improving Stress Prediction of Automobile Drivers23
Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning21
Enhanced Android Malware Detection and Family Classification, using Conversation-level Network Traffic Features18
A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security18
Performance Analysis of Efficient Spectrum Utilization in Cognitive Radio Networks by Dynamic Spectrum Access and Artificial Neuron Network Algorithms17
Computer Vision-based Early Fire Detection Using Enhanced Chromatic Segmentation and Optical Flow Analysis Technique10
Intelligent Association Classification Technique for Phishing Website Detection9
A Deep Learning based Arabic Script Recognition System: Benchmark on KHAT9
Software Defined Network: Load Balancing Algorithm Design and Analysis8
A New Digital Signature Algorithm for Ensuring the Data Integrity in Cloud using Elliptic Curves8
Persian Handwritten Digit Recognition Using Combination of Convolutional Neural Network and Support Vector Machine Methods7
Machine Learning-Based Model for Prediction of Power Consumption in Smart Grid7
A Modified DBSCAN Algorithm for Anomaly Detection in Time-series Data with Seasonality7
Predicting Student Enrolments and Attrition Patterns in Higher Educational Institutions using Machine Learning7
Instagram Post Popularity Trend Analysis and Prediction using Hashtag, Image Assessment, and User History Features6
An Architecture of IoT-Aware Healthcare Smart System by Leveraging Machine Learning6
Crop Disease Prediction with Convolution Neural Network (CNN) Augmented With Cellular Automata6
A Secure Cellular Automata Integrated Deep Learning Mechanism for Health Informatics6
The Intrusion Detection System by Deep Learning Methods: Issues and Challenges6
Wrapper based Feature Selection using Integrative Teaching Learning Based Optimization Algorithm6
The Jordanian Universities Experience in Integrating Online Learning and its Quality Assurance6
An Efficient Intrusion Detection Framework Based on Embedding Feature Selection and Ensemble Learning Technique5
A Novel Recurrent Neural Networks Architecture for Behavior Analysis5
A Hybrid Deep Learning Based Assist System for Detection and Classification of Breast Cancer from Mammogram Images5
Detection of Bundle Branch Block using Higher Order Statistics and Temporal Features5
Supervised Fuzzy C-Means Techniques to Solve the Capacitated Vehicle Routing Problem5
A Distributed Framework of Autonomous Drones for Planning and Execution of Relief Operations during Flood Situations5
Stacknet Based Decision Fusion Classifier for Network Intrusion Detection5
IoT Security Using AES Encryption Technology based ESP32 Platform5
A Genetic Algorithm based Domain Adaptation Framework for Classification of Disaster Topic Text Tweets5
Emotion Recognition based on EEG Signals in Response to Bilingual Music Tracks5
A Sentiment Analysis System for the Hindi Language by Integrating Gated Recurrent Unit with Genetic Algorithm5
A Deep Learning Based Prediction of Arabic Manuscripts Handwriting Style5
LoRaWAN Energy Optimization with Security Consideration5
Machine Learning in OpenFlow Network: Comparative Analysis of DDoS Detection Techniques5
Applying Deep Convolutional Neural Network (DCNN) Algorithm in the Cloud Autonomous Vehicles Traffic Model5
Streaming Video Classification Using Machine Learning4
Machine Learning Model for Credit Card Fraud Detection- A Comparative Analysis4
Improved YOLOv3-tiny for Silhouette Detection Using Regularisation Techniques4
Sentiment Analysis System using Hybrid Word Embeddings with Convolutional Recurrent Neural Network4
Recurrence Quantification Analysis of Glottal Signal as non Linear Tool for Pathological Voice Assessment and Classification4
Text Similarity Computation Model for Identifying Rumor Based on Bayesian Network in Microblog4
Hybrid FiST_CNN approach for Feature Extraction for Vision-Based Indian Sign Language Recognition4
Polynomial Based Fuzzy Vault Technique for Template Security in Fingerprint Biometrics4
Semantic Similarity Analysis for Corpus Development and Paraphrase Detection in Arabic4
A Sparse Topic Model for Bursty Topic Discovery in Social Networks4
Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network3
Highly Accurate Spam Detection with the Help of Feature Selection and Data Transformation3
A Novel Feature Selection Method Based on Maximum Likelihood Logistic Regression for Imbalanced Learning in Software Defect Prediction3
Swarm Intelligence Approach to QRS Detection3
Measure of Singular Value Decomposition (M-SVD) based Quality Assessment for Medical Images with Degradation3
Key Parts of Transmission Line Detection Using Improved YOLO v33
Random Walk Generation and Classification Within an Online Learning Platform3
Encryption Based on Cellular Automata for Wireless Devices in IoT Environment3
Incorporating Intelligence for Overtaking Moving Threatening Obstacles3
Software Metrics for Reusability of Component Based Software System: A Review3
Map Matching Algorithm: Empirical Review Based on Indian Open Street Map Road Network Data3
On Detection and Prevention of Zero-Day Attack Using Cuckoo Sandbox in Software-Defined Networks3
A Real-Time Business Analysis Framework Using Virtual Data Warehouse3
Human Activity Recognition Based on Transfer Learning with Spatio-Temporal Representations3
Arabic Quran Verses Authentication Using Deep Learning and Word Embeddings3
Speech Synthesis System for the Holy Quran Recitation3
Finger Knuckle Print Recognition using MMDA with Fuzzy Vault3
Skin Lesion Segmentation in Dermoscopy Imagery3
Discretization Based Framework to Improve the Recommendation Quality3
Improved Streaming Quotient Filter: A Duplicate Detection Approach for Data Streams3
Support Vector Machine with Information Gain Based Classification for Credit Card Fraud Detection System3
Deep Learning Shape Trajectories for Isolated Word Sign Language Recognition3
Cost-Aware Ant Colony Optimization Based model for Load Balancing in Cloud Computing3
Improved Intrusion Detection Algorithm based on TLBO and GA Algorithms3
A Concept-based Sentiment Analysis Approach for Arabic2
An Efficient Ensemble Architecture for Privacy and Security of Electronic Medical Records2
The Performance of Penalty Methods on Tree-Seed Algorithm for Numerical Constrained Optimization Problems2
Enhanced Latent Semantic Indexing Using Cosine Similarity Measures for Medical Application2
A New Approach for Detecting Eosinophils in the Gastrointestinal Tract and Diagnosing Eosinophilic Colitis2
Generation of Chaotic Signal for Scrambling Matrix Content2
A Personalized Recommendation for Web API Discovery in Social Web of Things2
Intensification and Interpretation of Performance in 5G adopting Millimeter Wave: A Survey & Future Research Direction2
A Comparative Study of Different Pre-Trained Deep Learning Models and Custom CNN for Pancreatic Tumor Detection2
Analyzing the Effect of Driving Speed on the Performance of Roundabouts2
Otsu’s Thresholding Method Based on Plane Intercept Histogram and Geometric Analysis2
A Deep Learning Approach for the Romanized Tunisian Dialect Identification2
A Heuristic Tool for Measuring Software Quality Using Program Language Standards2
Heart Disease Classification for Early Diagnosis based on Adaptive Hoeffding Tree Algorithm in IoMT Data2
An Investigative Analysis on Finding Patterns in Co-Author and Co-Institution Networks for LIDAR Research2
Solving Point Coverage Problem in Wireless Sensor Networks Using Whale Optimization Algorithm2
Analyzing the Behavior of Multiple Dimensionality Reduction Algorithms to Obtain Better Accuracy using Benchmark KDD CUP Dataset2
Survey on Software Changes: Reasons and Remedies2
An Efficient Intrusion Detection System by Using Behaviour Profiling and Statistical Approach Model2
Architecture Style Selection using Statistics of Quality Attributes to Reduce Production Costs2
Optimal Image Based Information Hiding with One-dimensional Chaotic Systems and Dynamic Programming2
Reliability-Aware: Task Scheduling in Cloud Computing Using Multi-Agent Reinforcement Learning Algorithm and Neural Fitted Q2
An Ensemble-based Supervised Machine Learning Framework for Android Ransomware Detection2
Glaucoma Detection using Tetragonal Local Octa Patterns and SVM from Retinal Images2
IoT Based Technique for Network Packet Analyzer2
An Efficient Parallel Version of Dynamic Multi-Objective Evolutionary Algorithm2
Spider Monkey Optimization Algorithm for Load Balancing in Cloud Computing Environments2
Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System2
Incorporating Reverse Search for Friend Recommendation with Random Walk2
Echo State Network Optimization using Hybrid-Structure Based Gravitational Search Algorithm with Square Quadratic Programming for Time Series Prediction2
Ontology-Based Transformation and Verification of UML Class Model2
Parallel Scalable Approximate Matching Algorithm for Network Intrusion Detection Systems2
IOT-Pattern-As-a-Service Model for Delay Sensitive IOT Integrated Applications2
Usability Study of Enhanced Salat Learning Approach using Motion Recognition System2
Reinforcement Energy Efficient ant Colony Optimization of Mobile Ad Hoc Multipath Routing Performance Enhancement2
Conceptual Persian Text Summarizer: A New Model in Continuous Vector Space2
Assesing The Stability And Selection Performance Of Feature Selection Methods Under Different Data Complexity2
F0 Modeling for Isarn Speech Synthesis using Deep Neural Networks and Syllable-level Feature Representation2
Saliency Cuts: Salient Region Extraction based on Local Adaptive Thresholding for Image Information Recognition of the Visually Impaired2
Multi-Pose Facial Expression Recognition Using Hybrid Deep Learning Model with Improved Variant of Gravitational Search Algorithm2
A Multi-Population Genetic Algorithm for Adaptive Qos-Aware Service Composition in Fog-Iot Healthcare Environment2
0.035668849945068