Home
Author Guide
Editor Guide
Reviewer Guide
Published Issues
Special Issue
Introduction
Special Issues List
Sections and Topics
Sections
Topics
Internet of Things (IoT) in Smart Systems and Applications
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access
Copyright and Licensing
Preservation and Repository Policy
Publication Ethics
Editorial Process
Contact Us
General Information
ISSN:
1798-2340 (Online)
Frequency:
Monthly
DOI:
10.12720/jait
Indexing:
ESCI (Web of Science)
,
Scopus
,
CNKI
,
etc
.
Acceptance Rate:
12%
APC:
1000 USD
Average Days to Accept:
87 days
Journal Metrics:
Impact Factor 2023: 0.9
4.2
2023
CiteScore
57th percentile
Powered by
Editor-in-Chief
Prof. Kin C. Yow
University of Regina, Saskatchewan, Canada
I'm delighted to serve as the Editor-in-Chief of
Journal of Advances in Information Technology
.
JAIT
is intended to reflect new directions of research and report latest advances in information technology. I will do my best to increase the prestige of the journal.
What's New
2024-12-23
JAIT Vol. 15, No. 12 has been published online!
2024-11-27
JAIT Vol. 15, No. 11 has been published online!
2024-10-23
JAIT Vol. 15, No. 10 has been published online!
Home
>
Published Issues
>
2023
>
Fuzzy Based Butterfly Life Cycle Algorithm for Measuring Company's Growth Performance
[Click]
Computer Vision-Based IoT Architecture for Post COVID-19 Preventive Measures
[Click]
Philippines' Free Wi-Fi Roll-out Project: Safe or Not?
[Click]
Gamelan Melody Generation Using LSTM Networks Controlled by Composition Meter Rules and Special Notes
[Click]
A Vehicle Sensor Network for Real-Time Air Pollution Analysis
[Click]
Intelligent Traffic Routing Algorithm for Wireless Sensor Networks in Agricultural Environment
[Click]
Comparative Analysis of Machine Learning in Predicting the Treatment Status of COVID-19 Patients
[Click]
An Optimized Machine Learning Approach for Coronary Artery Disease Detection
[Click]
The New Collective Signature Schemes Based on Two Hard Problems Using Schnorr's Signature Standard
[Click]
The Impact of Objectively Recorded Smartphone Usage and Emotional Intelligence on Problematic Internet Usage
[Click]
An Automated Deep Learning Framework for Human Identity and Gender Detection
[Click]
An Intelligent Arabic Model for Recruitment Fraud Detection Using Machine Learning
[Click]
Energy Prediction for Mobile Sink Placement by Deep Maxout Network in WSN
[Click]
Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System
[Click]
Ensuring Cloud Data Security Using the Soldier Ant Algorithm
[Click]
Analysis of Playing Positions in Tennis Match Videos to Assess Competition Using a Centroid Clustering Heatmap Prediction Technique
[Click]
Algorithm for Safety Decisions in Social Media Feeds Using Personification Patterns
[Click]
A Novel Distributed Machine Learning Model to Detect Attacks on Edge Computing Network
[Click]
Face Detection in Close-up Shot Video Events Using Video Mining
[Click]
Using IoT-Enabled RFID Smart Cards in an Indoor People-Movement Tracking System with Risk Assessment
[Click]
Comparison of Machine Learning Algorithms for Spam Detection
[Click]
A Novel Fuzzy-Based Thresholding Approach for Blood Vessel Segmentation from Fundus Image
[Click]
Detection of Cookie Bomb Attacks in Cloud Computing Environment Monitored by SIEM
[Click]
Client-Based Distributed Video Conferencing via WebRTC
[Click]
A Comprehensive Survey on Finger Vein Biometric
[Click]
Masked Face Detection and Recognition System Based on Deep Learning Algorithms
[Click]
Clickbait Detection in Indonesian News Title with Gray Unbalanced Class Based on BERT
[Click]
A Coloured Image Watermarking Based on Genetic K-Means Clustering Methodology
[Click]
A Generational Cohort Comparison of Icon Selection Accuracy under Varying Conditions of Icon Entropy and Concreteness
[Click]
Nonlinear Optimal Control Using Sequential Niching Differential Evolution and Parallel Workers
[Click]
A Weighted Ensemble of VAR and LSTM for Multivariate Forecasting of Cloud Resource Usage
[Click]
Balanced Truncation Approach for Unstable Continuous Systems Based on Mapping
[Click]
Analysis of Ransomware Using Reverse Engineering Techniques to Develop Effective Countermeasures
[Click]
Extractive Text Summarization for Indonesian News Article Using Ant System Algorithm
[Click]
A Novel Approach to Forecast Crude Oil Prices Using Machine Learning and Technical Indicators
[Click]
Forecasting Volatility in Generalized Autoregressive Conditional Heteroscedastic (GARCH) Model with Outliers
[Click]
Corpus-Based Vocabulary List for Thai Language
[Click]
Large-Scale Insect Pest Image Classification
[Click]
Firefly with Levy Based Feature Selection with Multilayer Perceptron for Sentiment Analysis
[Click]
Employee Reimbursement System for a Manufacturing Company
[Click]
Parallel Software Encryption of AES Algorithm by Using CAM-Based Massive-Parallel SIMD Matrix Core for Mobile Accelerator
[Click]
Breast Cancer Classification Using an Extreme Gradient Boosting Model with F-Score Feature Selection Technique
[Click]
Development of an Electronic Nose for Harmful Gases with Prediction Modeling Using Machine Learning
[Click]
Chronic Kidney Disease Prediction Using Machine Learning
[Click]
Multi-class Classification Approach for Retinal Diseases
[Click]
Spelling Check: A New Cognition-Inspired Sequence Learning Memory
[Click]
An Approach for Person Detection along with Object Using Machine Learning
[Click]
Automatic Diagnosis of Rice Leaves Diseases Using Hybrid Deep Learning Model
[Click]
An Analysis and Comparison of Proprietary and Open-Source Software for Building E-commerce Website: A Case Study
[Click]
A New Refined-TLBO Aided Bi-Generative Adversarial Network for Finger Vein Recognition
[Click]
A Survey on DDoS Detection and Prevention Mechanism
[Click]
Recommendation System of Food Package Using Apriori and FP-Growth Data Mining Methods
[Click]
Intelligent Fault Detection Based on Reinforcement Learning Technique on Distribution Networks
[Click]
An Approach to Improving Intrusion Detection System Performance Against Low Frequent Attacks
[Click]
Efficient FPGA-Based Convolutional Neural Network Implementation for Edge Computing
[Click]
Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance
[Click]
Causal Inference and Conditional Independence Testing with RCoT
[Click]
Automated Resource Management System Based upon Container Orchestration Tools Comparison
[Click]
Advanced Real Time Embedded Book Braille System
[Click]
Recommendation System with Content-Based Filtering in NFT Marketplace
[Click]
An Efficient Model to Predict Network Packets in TVDC Using Machine Learning
[Click]
A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks
[Click]
Utilizing Word Index Approach with LSTM Architecture for Extracting Adverse Drug Reaction from Medical Reviews
[Click]
Optimized Deep Neural Networks Audio Tagging Framework for Virtual Business Assistant
[Click]
Crowdsensing: Assessment of Cognitive Fitness Using Machine Learning
[Click]
DASS-21 Based Psychometric Prediction Using Advanced Machine Learning Techniques
[Click]
Designing an Android Application for Electronic Booking in Health Clinics and Building Health Record System
[Click]
Comparative Study on Model Skill of ERT and LSTM in Classifying Proper or Improper Execution of Free Throw, Jump Shot, and Layup Basketball Maneuvers
[Click]
Evaluation of Illumination in 3D Scenes Based on Heat Maps Comparison
[Click]
Fake News Detection in Social Media: Hybrid Deep Learning Approaches
[Click]
Detecting Unusual Activities in Local Network Using Snort and Wireshark Tools
[Click]
Intrusion Detection System in IoT Based on GA-ELM Hybrid Method
[Click]
A Literature Review on the Pervasiveness of Ransomware Threats and Attacks in the Philippines
[Click]
Empirical Evaluation of Machine Learning Performance in Forecasting Cryptocurrencies
[Click]
k-Anonymity Based on Tuple Migration in Sharing Data
[Click]
HASumRuNNer: An Extractive Text Summarization Optimization Model Based on a Gradient-Based Algorithm
[Click]
Fusion of CNN-QCSO for Content Based Image Retrieval
[Click]
Improvised Explosive Device Detection Using CNN With X-Ray Images
[Click]
A Distributed Software Project Management Framework
[Click]
Multi-speaker Speech Separation under Reverberation Conditions Using Conv-Tasnet
[Click]
Towards Ideal and Efficient Recommendation Systems Based on the Five Evaluation Concepts Promoting Serendipity
[Click]
Demystifying Blockchain: A Critical Analysis of Application Characteristics in Different Domains
[Click]
Open Banking API Framework to Improve the Online Transaction between Local Banks in Egypt Using Blockchain Technology
[Click]
Using Artificial Neural Network to Test Image Covert Communication Effect
[Click]
Comparison of Shoulder Range of Motion Evaluation by Traditional and Semi-Automatic Methods
[Click]
Authentication and Role-Based Authorization in Microservice Architecture: A Generic Performance-Centric Design
[Click]
Data Mining for Managing and Using Online Information on Facebook
[Click]
Improved Model to Detect Cancer from Cervical Histopathology Images by Optimizing Feature Selection and Ensemble Classifier
[Click]
Advances in the Development of an Algorithm for Parametric Identification of Egyptian Hieroglyphs Using Artificial Vision
[Click]
Linguistic Driven Feature Selection for Text Classification as Stop Word Replacement
[Click]
Improving Performance of Fuzzy-Based Handoff for Spectrum Utilization in Cognitive Radio Network Using Particle Swarm Optimization
[Click]
Malicious Agricultural IoT Traffic Detection and Classification: A Comparative Study of ML Classifiers
[Click]
Improved Opinion Mining for Unstructured Data Using Machine Learning Enabling Business Intelligence
[Click]
Part-of-Speech (POS) Tagging for Standard Brunei Malay: A Probabilistic and Neural-Based Approach
[Click]
Deep Image: An Efficient Image-Based Deep Conventional Neural Network Method for Android Malware Detection
[Click]
An Effective Time-Sharing Switch Migration Scheme for Load Balancing in Software Defined Networking
[Click]
Sentiment Analysis of Amazon Product Reviews by Supervised Machine Learning Models
[Click]
PWMStem: A Corpus-Based Suffix Identification and Stripping Algorithm for Multi-lingual Stemming
[Click]
A Simple and Effective Evaluation Method for Fault-Tolerant Routing Methods in Network-on-Chips
[Click]
Maximum Overlap Discrete Transform (MODT)—Gaussian Kernel Radial Network (GKRN) Model for Epileptic Seizure Detection from EEG Signals
[Click]
163 items
Previous
1
2
Next