ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: channel
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
A Spatio-Temporal Feature Representation of Multimodal Surveillance Images for Behavioral Recognition
Lei Ma,Hongxue Yang,Guanghao Jin
#Multimodal
#surveillance images
#spatio-temporal features
#behavioral recognition
#convolutional neural network
#dual attention mechanism
Novel Compression System for Hue-Saturation and Intensity Color Space
Noura Semary,Mohiy Hadhoud,Hatem Abdul-Kader,Alaa Abbas
#Hue
#saturation
#intensity
#encoding
#compression
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN
Reshma Vengaloor,Roopa Muralidhar
#Classification
#defect detection
#deep learning
#FRN structure
#yolov5
Pattern Recognition Using the Concept of Disjoint Matrix of MIMO System
Mezbahul Islam,Rahmina Rubaiat,Imdadul Islam,Mostafizur Rahaman,Mohamed Ruhul Amin
#Uncoupled MIMO links
#eigenvalues
#unitary matrix
#noise and channel matrix
A Highly Parallelizable Hash Algorithm Based on Latin Cubes
Ming Xu
#Hash algorithm
#latin cubes
#3D attribute
#parallelism
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
Incorporating Triple Attention and Multi-scale Pyramid Network for Underwater Image Enhancement
Kaichuan Sun,Yubo Tian
#Underwater image enhancement
#attention mechanism
#multi-scale pyramid network
#encoder-decoder
#English auction
# bilinear pairings
# bilinear Diffi e*Hellman problem
# hash function
Thomas Brindha and Ramaswamy Shaji
#
Yang Ming1 and Yumin Wang2
#
Securing RSA Algorithm against Timing Attack
Department of Information Technology, Alpha College of Engineering and Technology, India
#
A Dynamic Traffic Shaping Technique for a Scalable QoS in ATM Networks
, Ganiyu Aderounmu 2
#A synchronous transfer mode
# quality of service
# complete sharing / gradual release
# traffic shaper
# constant bit rate
# variable bit rate
Subtraction Detection Techniques
#Hybrid SCM SAC-OCDMA
# subtraction detection techniq ue
# multi access interference
# optical communication system
#
2
# Adaptive beamforming
# LMS algorithm
# MC-CDMA
# MIMO system
# smart antenna
Interference Mitigation Technique
#Ultra-wideband
# power control
# narrowband interfere nce
# NBI
# TOA
Language Based Information Routing Security: Policy Enforcement
, and Fredrick Mtenzi 2
#Security policy
# routing
# condition statements Received January 5
# 2007; accepted November 6
# 2007 1
1
2
3
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint