Home
Author Guide
Editor Guide
Reviewer Guide
Published Issues
Special Issue
Introduction
Special Issues List
Sections and Topics
Sections
Topics
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access
Copyright and Licensing
Preservation and Repository Policy
Publication Ethics
Editorial Process
Contact Us
General Information
ISSN:
1798-2340 (Online)
Frequency:
Bimonthly
DOI:
10.12720/jait
Indexing:
ESCI (Web of Science)
,
Scopus
,
CNKI
,
etc
.
Acceptance Rate:
19%
APC:
450 USD
Average Days to Accept:
112 days
Journal Metrics:
2.4
2021
CiteScore
44th percentile
Powered by
Editor-in-Chief
Prof. Kin C. Yow
University of Regina, Saskatchewan, Canada
I'm delighted to serve as the Editor-in-Chief of the
JAIT
Editorial Board.
JAIT
is intended to reflect new directions of research and report latest advances in information technology. I will do my best to increase the prestige of the journal.
What's New
2023-05-16
Vol. 14, No. 1 and No. 2 have been indexed by Crossref.
2023-05-16
JAIT Vol. 14, No. 1 has been indexed by Scopus.
2023-04-26
Vol. 14, No. 2 has been published online!
Home
>
Published Issues
>
2023
>
Fuzzy Based Butterfly Life Cycle Algorithm for Measuring Company's Growth Performance
[Click]
Computer Vision-Based IoT Architecture for Post COVID-19 Preventive Measures
[Click]
Philippines' Free Wi-Fi Roll-out Project: Safe or Not?
[Click]
Gamelan Melody Generation Using LSTM Networks Controlled by Composition Meter Rules and Special Notes
[Click]
A Vehicle Sensor Network for Real-Time Air Pollution Analysis
[Click]
Intelligent Traffic Routing Algorithm for Wireless Sensor Networks in Agricultural Environment
[Click]
Comparative Analysis of Machine Learning in Predicting the Treatment Status of COVID-19 Patients
[Click]
An Optimized Machine Learning Approach for Coronary Artery Disease Detection
[Click]
Causal Inference and Conditional Independence Testing with RCoT
[Click]
The New Collective Signature Schemes Based on Two Hard Problems Using Schnorr's Signature Standard
[Click]
The Impact of Objectively Recorded Smartphone Usage and Emotional Intelligence on Problematic Internet Usage
[Click]
An Automated Deep Learning Framework for Human Identity and Gender Detection
[Click]
An Intelligent Arabic Model for Recruitment Fraud Detection Using Machine Learning
[Click]
Energy Prediction for Mobile Sink Placement by Deep Maxout Network in WSN
[Click]
Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System
[Click]
Ensuring Cloud Data Security Using the Soldier Ant Algorithm
[Click]
Analysis of Playing Positions in Tennis Match Videos to Assess Competition Using a Centroid Clustering Heatmap Prediction Technique
[Click]
Algorithm for Safety Decisions in Social Media Feeds Using Personification Patterns
[Click]
A Novel Distributed Machine Learning Model to Detect Attacks on Edge Computing Network
[Click]
Face Detection in Close-up Shot Video Events Using Video Mining
[Click]
Using IoT-Enabled RFID Smart Cards in an Indoor People-Movement Tracking System with Risk Assessment
[Click]
Comparison of Machine Learning Algorithms for Spam Detection
[Click]
A Novel Fuzzy-Based Thresholding Approach for Blood Vessel Segmentation from Fundus Image
[Click]
Detection of Cookie Bomb Attacks in Cloud Computing Environment Monitored by SIEM
[Click]
Client-Based Distributed Video Conferencing via WebRTC
[Click]
A Comprehensive Survey on Finger Vein Biometric
[Click]
Masked Face Detection and Recognition System Based on Deep Learning Algorithms
[Click]
Clickbait Detection in Indonesian News Title with Gray Unbalanced Class Based on BERT
[Click]
A Coloured Image Watermarking Based on Genetic K-Means Clustering Methodology
[Click]
A Generational Cohort Comparison of Icon Selection Accuracy under Varying Conditions of Icon Entropy and Concreteness
[Click]
Nonlinear Optimal Control Using Sequential Niching Differential Evolution and Parallel Workers
[Click]
A Weighted Ensemble of VAR and LSTM for Multivariate Forecasting of Cloud Resource Usage
[Click]
Balanced Truncation Approach for Unstable Continuous Systems Based on Mapping
[Click]
Analysis of Ransomware Using Reverse Engineering Techniques to Develop Effective Countermeasures
[Click]
Extractive Text Summarization for Indonesian News Article Using Ant System Algorithm
[Click]
A Novel Approach to Forecast Crude Oil Prices Using Machine Learning and Technical Indicators
[Click]
Forecasting Volatility in Generalized Autoregressive Conditional Heteroscedastic (GARCH) Model with Outliers
[Click]
Corpus-Based Vocabulary List for Thai Language
[Click]
Large-Scale Insect Pest Image Classification
[Click]
Firefly with Levy Based Feature Selection with Multilayer Perceptron for Sentiment Analysis
[Click]
Employee Reimbursement System for a Manufacturing Company
[Click]
Parallel Software Encryption of AES Algorithm by Using CAM-Based Massive-Parallel SIMD Matrix Core for Mobile Accelerator
[Click]
Breast Cancer Classification Using an Extreme Gradient Boosting Model with F-Score Feature Selection Technique
[Click]
Development of an Electronic Nose for Harmful Gases with Prediction Modeling Using Machine Learning
[Click]
Chronic Kidney Disease Prediction Using Machine Learning
[Click]
Multi-class Classification Approach for Retinal Diseases
[Click]
Spelling Check: A New Cognition-Inspired Sequence Learning Memory
[Click]
An Approach for Person Detection along with Object Using Machine Learning
[Click]
Automatic Diagnosis of Rice Leaves Diseases Using Hybrid Deep Learning Model
[Click]
An Analysis and Comparison of Proprietary and Open-Source Software for Building E-commerce Website: A Case Study
[Click]
A New Refined-TLBO Aided Bi-Generative Adversarial Network for Finger Vein Recognition
[Click]
A Survey on DDoS Detection and Prevention Mechanism
[Click]
Recommendation System of Food Package Using Apriori and FP-Growth Data Mining Methods
[Click]
Intelligent Fault Detection Based on Reinforcement Learning Technique on Distribution Networks
[Click]
An Approach to Improving Intrusion Detection System Performance Against Low Frequent Attacks
[Click]
Efficient FPGA-Based Convolutional Neural Network Implementation for Edge Computing
[Click]
Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance
[Click]
Automated Resource Management System Based upon Container Orchestration Tools Comparison
[Click]
Advanced Real Time Embedded Book Braille System
[Click]