ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: recovery
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Extension for Real Time Applications
#
Extension for Real Time Applications
#
Computer and Information Science Department, Univer sity Technology Patroness, Malaysia
# Critical service
# recovery
# resources reconfigurati on
# survivability
High-Availability Decentralized Cryptographic Multi-Agent Key Recovery
# Cryptographic key management
# secret sharing
# key r ecovery
# KRAs
Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT
Abstract: Content authentication requires that the image watermarks must highlight malicious attacks while tolerating
#Content authentication
# self authentication
# recovery watermark
# DWT
# PQ sequence
Reverse Engineering of Object Oriented System
Abstract: Now a day’s common problem faced by software community is to understand the legacy code. A decade ago the
#Clustering
# feature selection
# hierarchical
# reverse engineering
# rational software architect
Verification of Cooperative Transient Fault Diagnosis and Recovery in Critical
Zibouda Aliouat
#Group membership protocol
# formal verification
# fau lt)tolerant distributed algorithm
# node reintegration
Driving Signature Analysis for Auto-Theft Recovery
Adrian Bosire,Damian Maingi
#Deep learning
#swarm intelligence
#driving signature
#intelligent transportation system
Half-Duplex and Full-Duplex Performance Comparison for Different Fading Channel Using HMR Protocol in MIMO Technology
Daphney Joann,Vayanaperumal Rajamani
#Relay network
#HD
#FD
#HMR Protocol
#MIMO
#BER
#SNR
Optimal Image Based Information Hiding with One-dimensional Chaotic Systems and Dynamic Programming
Yinglei Song,Jia Song,Junfeng Qu
#Encryption and hiding
#minimized hiding effects
#improved security
#convenient recovery
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint