ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: protocol
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Improved Q-Learning Algorithm Integrated into the Aloha Anti-Collision Protocol for Energy-Efficient RFID Systems
Van-Hoa Le,Duc-Nhat-Quang Nguyen,Viet-Minh-Nhat Vo
#RFID system
#aloha protocol
#anti-collision
#Q-learning
#energy-efficiency
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
An Effective Management Model for Data Caching in MANET Environment
Amer Abu Salem
#MANET
#NS3
#admission control
#replacement strategy
#consistency strategy
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
TSO Clustered Protocol to Extend Lifetime of IoT Based Mobile Wireless Sensor Networks
Giji Kiruba Dasebenezer,Benita Joselin
#MWSN
#clustering
#sensor nodes
#TSO
#PSO
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
Convolutional Neural Network Based Hand Gesture Recognition in Sophisticated Background for Humanoid Robot Control
Ali Yildiz,Nurettin Gökhan Adar,Ahmet Mert
#Hand gesture recognition
#human-robot interaction
#robot control
#convolutional neural network
#deep learning
A Statistical Framework for Identification of
#
Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID
#Low*cost RFID
# cryptography
# protocol
# vulnerabilit y
1
# Active authentication
# data originator
# verifier
# E CC
# e&passport
# ES
# passive authentication
Efficient Modified Elliptic Curve Diffie-Hellman
Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years.
#
Hierarchical Based Group Key Transfer for Secure
1Department of Information Science and Technology, A nna University, India
#
Secure Verification Technique for Defending IP
#
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks Essam Natsheh, Adznan Jantan, Sabira Khatun, and Shamala Subramaniam
paths between nodes within a network. Due to nodes mobility, the efficiency of a dynamic ad-hoc routing protocol depends
#Ad-hoc networks
# AODV
# beacon messages
# fuzzy systems
# intelligent networks
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc Essam Natsheh, Adznan B. Jantan, Sabira Khatun, and Shamala Subramaniam
powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic
#Active queue management
# ad-hoc networks
# fuzzy systems
# intelligent networks
# network congestion
Incompatibility Dimensions and Integration of Atomic Commit Protocols
Abstract: Advanced software application systems contain transactions that tend to traverse incompatible database sites
#Two-phase commit
# voting protocols
# distributed transaction processing
# integrated database systems
# internet transactions
# electronic services and electronic commerce
1
2
3
4
5
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint