ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: delay
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
A Novel Adaptive ANC Algorithm for Removal of Background Noise in Speech Applications
Vinothkumar.G,Manoj Kumar.D
#ANC
#FxNLMS
#NIHL
#speech enhancement
#background noise cancellation
#MSE
#SNRi
#PESQ and STOI
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
TSO Clustered Protocol to Extend Lifetime of IoT Based Mobile Wireless Sensor Networks
Giji Kiruba Dasebenezer,Benita Joselin
#MWSN
#clustering
#sensor nodes
#TSO
#PSO
Genetic Algorithm with Random and Memory Immigrant Strategies for Solving Dynamic Load Balanced Clustering Problem in Wireless Sensor Networks
Mohaideen Pitchai
#Wireless sensor networks
#genetic algorithm
#load balanced clustering
#random immigrants
#memory immigrants
# Job scheduling
# data replication
# RC
# replica manag er
# resource discovery
# counting bloom filter
iHPProxy:Improving the Performance of HPProxy by Adding Extra Hot-Points
Abstract:In recent years, the interest of Internet users turned intoviewingvideos such asVideo-on-Demand (VoD), online
#Proxycaching
# shift distance
#HPProxy
# cache replacement
# multimedia streaming
#VoD
A Dynamic Traffic Shaping Technique for a Scalable QoS in ATM Networks
, Ganiyu Aderounmu 2
#A synchronous transfer mode
# quality of service
# complete sharing / gradual release
# traffic shaper
# constant bit rate
# variable bit rate
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
Department of Electronics Engineering, Anna Univers ity, India. 2Department of Information Technology, Thiagarajar C ollege of Engineering, India.
# Hybrid MANET
# mobile agents
# AODV ALMA
# adaptive g ateway discovery
Receivers Using Network Processor IXP 2400
# Buffer utilization
# network processor
# play out buf fer
# play back time
# video streaming Received February 6
# 2007; accepted November 6
# 200 8 1
An Integrated Radix-4 Modular Divider/Multiplier
1
#Cryptography
# number theory
# finite field arithmetic
# hardware de sign
# and radix$4
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc
Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna
# Shamir’s secret sharing
# DoS
# routing cum forwardin g
# certificate revocation
# certification revival
The International Arab Journal of Information Techn ology, Vol. 11, No. 2, March 2014
#CSFQ
# quality of service
# MQFQ
# priority scheduler
An Architecture of Thin Client-Edge Computing
Aymen Alsaffar, Pham Hung, and Eui-Nam Huh
#Cloud computing
# data distribution
# edge computing
# resource allocation
# and thin client
1
2
3
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint