Home|Journals|Articles by Year|Audio Abstracts
 

Articles from Jordanian Journal of Computers and Information Technology



  1. AN IMPROVED FRACTIONAL TWO-DIMENSIONAL PRINCIPAL COMPONENT ANALYSIS FOR FACE RECOGNITION
    Falah Alsaqre
    JJCIT. 2022; 8(1): 87-97
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1637874750

  2. A COMPARATIVE STUDY OF DIFFERENT SEARCH AND INDEXING TOOLS FOR BIG DATA
    Ahmed OUSSOUS, fatima zahra benjelloun
    JJCIT. 2022; 8(1): 72-86
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1637097759

  3. ED25519: A New Secure Compatible Elliptic Curve for Mobile Wireless Network Security
    MAUSAM DAS, Zenghui Wang
    JJCIT. 2022; 8(1): 57-71
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1636268309

  4. MELANOMA SKIN LESION CLASSIFICATION USING IMPROVED EFFICIENTNETB3
    Saumya R Salian, Dr. Sudhir D Sawarkar
    JJCIT. 2022; 8(1): 45-56
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1636005929

  5. AN IN-DEPTH VISION TO HARDWARE DESIGN SECURITY VULNERABILITIES
    Zainab Khalid Younis, Basim Mahmood
    JJCIT. 2022; 8(1): 33-44
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1635517841

  6. DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY
    Malek M. Barhoush, Bilal H. Abed-Alguni , Rafat Hammad , Mohammad Al-Fawareh , Rana N. Hassan
    JJCIT. 2022; 8(1): 18-32
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1632868199

  7. CLUSTERING VIETNAMESE CONVERSATIONS FROM FACEBOOK PAGE TO BUILD TRAINING DATASET FOR CHATBOT
    Trieu Hai Nguyen, Thi-Kim-Ngoan Pham , Thi-Hong-Minh Bui, Thanh-Quynh-Chau Nguyen
    JJCIT. 2022; 8(1): 1-17
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1632557439

  8. A Mobile Agent-Based Method to Counter Sinkhole Attacks in Wireless Sensor Networks
    Hadi Khosravi, Mohammad GhasemiGol
    JJCIT. 2021; 7(4): 391-405
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1632893264

  9. Network Intrusion Detection Systems Using Supervised Machine Learning Classification and Dimensionality Reduction Techniques: A Systematic Review
    Zein Ashi, Laila Aburashed, Mahmoud Al-Qudah, Abdallah Qusef
    JJCIT. 2021; 7(4): 373-390
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1629527707

  10. BRAIN-INSPIRED SPIKING NEURAL NETWORKS FOR WI-FI BASED HUMAN ACTIVITY RECOGNITION
    Yee Leong Tan, Yan Chiew Wong, Syafeeza Ahmad Radzi
    JJCIT. 2021; 7(4): 363-372
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1629096728

  11. WORKFLOW SCHEDULING ACCORDING TO DATA DEPENDENCIES IN COMPUTATIONAL CLOUDS
    Batoul Khazaie, Hamid Saadatfar
    JJCIT. 2021; 7(4): 349-362
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1626545510

  12. TWO-WAY METRIC LEARNING WITH MAJORITY AND MINORITY SUBSETS FOR CLASSIFICATION OF LARGE EXTREMELY IMBALANCED FACE DATASET
    Ashu Kaushik, Seba Susan
    JJCIT. 2021; 7(4): 337-348
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1626417940

  13. UNCONSTRAINED EAR RECOGNITION USING TRANSFORMERS
    Marwin Alejo
    JJCIT. 2021; 7(4): 326-336
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1627981530

  14. COMPARATIVE STUDY OF MACHINE LEARNING AND DEEP LEARNING ALGORITHM FOR FACE RECOGNITION
    Nikita Singhal, Vaishali Ganganwar, Menka Yadav, Asha Chauhan, Mahender Jakhar, Kareena Sharma
    JJCIT. 2021; 7(3): 313-325
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1624859356

  15. WEIGHTED GREY WOLF OPTIMIZER WITH IMPROVED CONVERGENCE RATE IN TRAINING MULTI-LAYER PERCEPTRON TO SOLVE CLASSIFICATION PROBLEMS
    Alok kumar, Lekhraj , Anoj Kumar
    JJCIT. 2021; 7(3): 292-312
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1621353647

  16. A NEW ADAPTED CANNY FILTER FOR EDGE DETECTION IN RANGE IMAGES
    Mohamed Cheribet , Smaine Mazouzi
    JJCIT. 2021; 7(3): 278-291
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1620428305

  17. Decreasing the RA Collision Impact for Massive NB-IoT in 5G Wireless Networks
    Bilal Rabah Al-Doori, Ahmed Zurfi
    JJCIT. 2021; 7(3): 268-277
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1620292048

  18. INCREASING SECURITY IN MILITARY SELF-PROTECTED SOFTWARE
    Carlos M Gonzalez
    JJCIT. 2021; 7(3): 253-267
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1620148110

  19. INTRODUCING A NEW ROUTING ALGORITHM For WIRELESS NETWORKS ON CHIP USING REINFORCEMENT LEARNING
    Zohreh Harati, Esmaeel Tahanian, Alireza Tajary, Mansoor Fateh
    JJCIT. 2021; 7(3): 239-252
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1618577670

  20. A HYPER-SURFACE-BASED MODELING AND CORRECTION OF BIAS FIELD IN MR IMAGES
    Daouia Azzouz, Smaine Mazouzi
    JJCIT. 2021; 7(3): 223-238
    » Abstract » Full-text PDF » doi: 10.5455/jjcit.71-1617051919



Pages: 12345678...11


Articles by Year
2024 (31)
2023 (27)
2022 (29)
2021 (29)
2020 (29)
2019 (20)
2018 (14)
2017 (13)
2016 (14)
2015 (5)


SUBMIT your ARTICLE
to
Jordanian Journal of Computers and Information Technology
Jordanian Journal of Computers and Information Technology
Publisher : Princess Sumaya University for Technology
Title : Jordanian Journal of Computers and Information Technology
Abbreviation : JJCIT
p-ISSN : 2413-9351
e-ISSN : 2415-1076
Language(s) : English
Web Page : jjcit.org
Frequency : 4 issues per year
Subject : Computers, Communications, and Information Technology
List Articles from Jordanian Journal of Computers and Information Technology


Online Article Submission
• ejmanager.com




ejPort - eJManager.com
Refer & Earn
JournalList
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.