ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: recovery
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
An Improved Taylor Hyperbolic Tangent and Sigmoid Activations for Avoiding Vanishing Gradients in Recurrent Neural Nets
Tirupati Gullipalli,Krishna Murali,Srinivasa Peri
#Vanishing gradient
#taylor expansion
#functional approximation
#sigmoid
#hyperbolic tangent
#neural networks
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Extension for Real Time Applications
#
Extension for Real Time Applications
#
Computer and Information Science Department, Univer sity Technology Patroness, Malaysia
# Critical service
# recovery
# resources reconfigurati on
# survivability
High-Availability Decentralized Cryptographic Multi-Agent Key Recovery
# Cryptographic key management
# secret sharing
# key r ecovery
# KRAs
Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT
Abstract: Content authentication requires that the image watermarks must highlight malicious attacks while tolerating
#Content authentication
# self authentication
# recovery watermark
# DWT
# PQ sequence
Reverse Engineering of Object Oriented System
Abstract: Now a day’s common problem faced by software community is to understand the legacy code. A decade ago the
#Clustering
# feature selection
# hierarchical
# reverse engineering
# rational software architect
Verification of Cooperative Transient Fault Diagnosis and Recovery in Critical
Zibouda Aliouat
#Group membership protocol
# formal verification
# fau lt)tolerant distributed algorithm
# node reintegration
Driving Signature Analysis for Auto-Theft Recovery
Adrian Bosire,Damian Maingi
#Deep learning
#swarm intelligence
#driving signature
#intelligent transportation system
Half-Duplex and Full-Duplex Performance Comparison for Different Fading Channel Using HMR Protocol in MIMO Technology
Daphney Joann,Vayanaperumal Rajamani
#Relay network
#HD
#FD
#HMR Protocol
#MIMO
#BER
#SNR
Optimal Image Based Information Hiding with One-dimensional Chaotic Systems and Dynamic Programming
Yinglei Song,Jia Song,Junfeng Qu
#Encryption and hiding
#minimized hiding effects
#improved security
#convenient recovery
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint