![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2024
- Khushboo Agarwal, Manish Dixit:
Scrupulous SCGAN framework for recognition of restored images with caffe based PCA filtration. Int. Arab J. Inf. Technol. 21(1): 107-116 (2024) - Mustafa Al-Fayoumi, Qasem Abu Al-Haija, Rakan Armoush, Christine Amareen:
XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering. Int. Arab J. Inf. Technol. 21(1): 128-146 (2024) - Muyideen Ayodeji Alaketu, Abiodun Oguntimilehin, Kehinde Adebola Olatunji, Oluwatoyin Bunmi Abiola, Bukola Badeji-Ajisafe, Christiana Olanike Akinduyite, Stephen Eyitayo Obamiyi, Gbemisola Olutosin Babalola, Toyin Okebule:
Comparative analysis of intrusion detection models using big data analytics and machine learning techniques. Int. Arab J. Inf. Technol. 21(2): 326-337 (2024) - Jawad Hasan Alkhateeb, Ehsan Owaidah, Aiman Turani, Rashiq Marie, Aladdein M. Amro, Ahmad A. Mazhar:
A framework for saudi uniform gait recognition based on kinect skeletal tracking. Int. Arab J. Inf. Technol. 21(2): 271-279 (2024) - Mohammed A. Alqarni:
Embedding search for quranic texts based on large language models. Int. Arab J. Inf. Technol. 21(2): 243-256 (2024) - Fouzia El Azzaby, Nabil El Akkad, Khalid Sabour:
The coupling of a multiplicative group and the theory of chaos in the encryptions of images. Int. Arab J. Inf. Technol. 21(1): 1-16 (2024) - Deepali Bajaj, Anita Goel, Suresh Chand Gupta:
A comprehensive microservice extraction approach integrating business functions and database entities. Int. Arab J. Inf. Technol. 21(1): 32-45 (2024) - Ghizlane Bourahouat, Manar Abourezq, Najima Daoudi:
Word embedding as a semantic feature extraction technique in arabic natural language processing: an overview. Int. Arab J. Inf. Technol. 21(2): 313-325 (2024) - Praveen M. Dhulavvagol, Shashikumar G. Totad, Atrey Anagal:
SHARD-FEMF: adaptive forensic evidence management framework using blockchain sharding and IPFS. Int. Arab J. Inf. Technol. 21(2): 179-190 (2024) - Aditya Dubey, Pradeep Yadav, Subhash Chandra Patel:
Usage of statistical techniques to monitor the performance of wind turbines. Int. Arab J. Inf. Technol. 21(2): 338-349 (2024) - Yuanyuan Gao, Qiang Qian, Xuefeng Sun, Jiankun An, Yutao Yuan:
Evaluation model of athletes' lower extremity training ability based on LSTM algorithm. Int. Arab J. Inf. Technol. 21(1): 147-157 (2024) - Abeer Hamed, Alaa Mohamed Riad, Ramadan Mowad, Hazem M. El-Bakry:
Software quality assessment approach using analytical hierarchical model: applied in SMEs. Int. Arab J. Inf. Technol. 21(2): 280-291 (2024) - Ruijuan Hu, Haiyan Liu, Wentao Yu:
ERDAP: A novel method of event relation data augmentation based on relation prediction. Int. Arab J. Inf. Technol. 21(1): 67-74 (2024) - Rachid Karra, Abdelali Lasfar:
Analysis of QA system behavior against context and question changes. Int. Arab J. Inf. Technol. 21(2): 191-200 (2024) - Jiayao Li, Rui Wang:
An anomaly detection method for weighted data based on feature association analysis. Int. Arab J. Inf. Technol. 21(1): 117-127 (2024) - Bangalore Nagaraj Madhukar, Shivanandamurthy Hiremath Bharathi, Matta Polnaya Ashwin:
Classification of breast cancer using ensemble filter feature selection with triplet attention based efficient net classifier. Int. Arab J. Inf. Technol. 21(1): 17-31 (2024) - Mohammed Maree, Mujahed Eleyat, Enas Mesqali:
Optimizing machine learning-based sentiment analysis accuracy in bilingual sentences via preprocessing techniques. Int. Arab J. Inf. Technol. 21(2): 257-270 (2024) - Ahmad Nabot:
Software component selection: an optimized selection criterion for component-based software engineering (CBSE). Int. Arab J. Inf. Technol. 21(2): 211-225 (2024) - Gokul Narayanan, Saravanaguru Kannan:
Enhancing security in cloud-based VM migration: a trust-centric hybrid optimization approach. Int. Arab J. Inf. Technol. 21(1): 166-177 (2024) - Srinivasan Narayanasamy, Mohan Kumar Palanichamy, Selvam Lakshmanan, Arokia Renjit Jerald:
Achieving better resource utilization by implementing a high-performance intelligent framework in a distributed environment. Int. Arab J. Inf. Technol. 21(2): 292-298 (2024) - Abiodun Oguntimilehin, Kolade Balogun:
Real-time sign language fingerspelling recognition using convolutional neural network. Int. Arab J. Inf. Technol. 21(1): 158-165 (2024) - Elamparithi Pandian, K. Ruba Soundar, Shenbagalakshmi Gunasekaran, Shenbagarajan Anantharajan:
Fuzzy heuristics for detecting and preventing black hole attack. Int. Arab J. Inf. Technol. 21(1): 85-93 (2024) - Vimala Devi Parthasarathy, Kalaichelvi Visvalingam:
Healthcare data security in cloud storage using light weight symmetric key algorithm. Int. Arab J. Inf. Technol. 21(1): 57-66 (2024) - Sandeep Sutar, Manjunathswamy Byranahalli Eraiah, Kumarswamy Shivashankaraiah:
A dual-objective approach for allocation of virtual machine with improved job scheduling in cloud computing. Int. Arab J. Inf. Technol. 21(1): 46-56 (2024) - Veena Sivasamy Thanasekaran, Arivazhagan Selvaraj:
Low dimensional multi class steganalysis of spatial LSB based stego images using textural features. Int. Arab J. Inf. Technol. 21(2): 233-242 (2024) - Anusha Thanganadar, Venkatesan Raman:
Integrated shared random key agreement protocol for wireless sensor network. Int. Arab J. Inf. Technol. 21(2): 201-210 (2024) - Reshma Vengaloor, Roopa Muralidhar:
Deep learning based feature discriminability boosted concurrent metal surface defect detection system using YOLOv-5s-FRN. Int. Arab J. Inf. Technol. 21(1): 94-106 (2024) - Jagtap Vinyak, Parag Kulkarni, Pallavi Joshi:
Turning point induced knowledge forecasting under uncertainties (TrIK). Int. Arab J. Inf. Technol. 21(2): 226-232 (2024) - Jun Wang, Yuanxi Wang:
FD technology for HSs based on deep convolutional generative adversarial networks. Int. Arab J. Inf. Technol. 21(2): 299-312 (2024) - Jing Zhang, Guiyan Wei, Yonggong Ren:
Cohesive pair-wises constrained deep embedding for semi-supervised clustering with very few labeled samples*. Int. Arab J. Inf. Technol. 21(1): 75-84 (2024)
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-19 00:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint