ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: channel
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN
Reshma Vengaloor,Roopa Muralidhar
#Classification
#defect detection
#deep learning
#FRN structure
#yolov5
Pattern Recognition Using the Concept of Disjoint Matrix of MIMO System
Mezbahul Islam,Rahmina Rubaiat,Imdadul Islam,Mostafizur Rahaman,Mohamed Ruhul Amin
#Uncoupled MIMO links
#eigenvalues
#unitary matrix
#noise and channel matrix
A Highly Parallelizable Hash Algorithm Based on Latin Cubes
Ming Xu
#Hash algorithm
#latin cubes
#3D attribute
#parallelism
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
Incorporating Triple Attention and Multi-scale Pyramid Network for Underwater Image Enhancement
Kaichuan Sun,Yubo Tian
#Underwater image enhancement
#attention mechanism
#multi-scale pyramid network
#encoder-decoder
#English auction
# bilinear pairings
# bilinear Diffi e*Hellman problem
# hash function
Thomas Brindha and Ramaswamy Shaji
#
Yang Ming1 and Yumin Wang2
#
Securing RSA Algorithm against Timing Attack
Department of Information Technology, Alpha College of Engineering and Technology, India
#
A Dynamic Traffic Shaping Technique for a Scalable QoS in ATM Networks
, Ganiyu Aderounmu 2
#A synchronous transfer mode
# quality of service
# complete sharing / gradual release
# traffic shaper
# constant bit rate
# variable bit rate
Subtraction Detection Techniques
#Hybrid SCM SAC-OCDMA
# subtraction detection techniq ue
# multi access interference
# optical communication system
#
2
# Adaptive beamforming
# LMS algorithm
# MC-CDMA
# MIMO system
# smart antenna
Interference Mitigation Technique
#Ultra-wideband
# power control
# narrowband interfere nce
# NBI
# TOA
Language Based Information Routing Security: Policy Enforcement
, and Fredrick Mtenzi 2
#Security policy
# routing
# condition statements Received January 5
# 2007; accepted November 6
# 2007 1
A Novel Radon-Wavelet-Based Multi-Carrier Code
Electrical Engineering Department, Tafila Technical University, Jordan
# Finite radon transform
# DWT
# radon'wavelet based OFDM
# multiwavelet based MC'CDMA
# radon based MC' CDMA
# FFT based MC'CDMA
Decoder Up to 4 Errors
# Soft decoding algorithm
# golay code
# FPGA
An SNR Unaware Large Margin Automatic Modulations Classifier in Variable SNR
Department of Electrical and Computer Engineering, Science and Research Branch, Islamic Azad
#Automatic modulation classification
# pattern recognition
# partially supervised classification
#passive-aggressive classifier
# SNR un-aware classification
A New Leaky-LMS Algorithm with Analysis
Abstract: Though the Leaky Least-Mean-Square (LLMS) algorithm mitigates the drifting problem of the LMS algorithm, its
#LLMS algorithm
# channel estimation
# channel equalization
# impulsive noise
1
2
3
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint