ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: graph
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Location-Based Routing Protocol with Optimized Data Aggregation for Vehicular Ad Hoc Networks (VANETs)
Abdelkrim Houacine,Mansour Mekour
#VANETs
#dynamic routing
#data efficiency
#location-aware communication
#mobility optimization
Unsupervised Convolutional Autoencoder Framework for Multimodal Medical Image Fusion in Brain Tumour Diagnosis
Saravanan Vijayan,Malarvizhi Subramani
#Unsupervised learning
#autoencoders
#image fusion
#medical images
#brain tumours
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Location-Based Routing Protocol with Optimized Data Aggregation for Vehicular Ad Hoc Networks (VANETs)
Abdelkrim Houacine,Mansour Mekour
#VANETs
#dynamic routing
#data efficiency
#location-aware communication
#mobility optimization
Unsupervised Convolutional Autoencoder Framework for Multimodal Medical Image Fusion in Brain Tumour Diagnosis
Saravanan Vijayan,Malarvizhi Subramani
#Unsupervised learning
#autoencoders
#image fusion
#medical images
#brain tumours
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Federated Graph Neural Networks for Dynamic IoT Collaboration Optimization in Smart Home Environments
Cheng Zhang,Yuanquan Zhong
#IoT device collaboration
#graph neural network
#federated learning
#graph structure
#smart home
Bidirectional Circular Shift-Based Reversible Steganography Algorithm with Dual Stego-Images
Mujeebudheen Khan Immamuddinkhan,Siva Sankar Kanahasabapathy
#Data hiding
#multiple stego-image
#PSNR
#bi-directional shift
#stego-image
Arabic Language Characteristics that Make its Automatic Processing Challenging
Ilhem Boulesnam,Rabah Boucetti
#Computational linguistics
#natural language processing
#Arabic natural language processing
#Arabic characteristics
#Arabic language automation
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases
Ayman Mousa,Osama Faragallah,Elsayed Rabaie,Elsayed Nigm
#Database security
#cryptographic algorithms
#datab ase encryption
#Elsayed Rabaie
#Elsayed Nigm
Semantic Adaptation of Multimedia Documents
Azze-Eddine Maredj,Nourredine Tonkin
#Multimedia document adaptation
#semantic adaptation
#conceptual neighborhood graph
#relaxation graph
An Improved Version of the Visual Digital Signature Scheme
Abdullah Jaafar,Azman Samsudin
#Digital signature
#non&expansion visual cryptograph y
#boolean operation
#visual share
Implementation and Comparative Analysis of the Fault Attacks on AES
Saleem Raza,Malik Najmus Saqib,Azfar Shakeel,Majid Iqbal Khan
#Fault attack
#AES
#cryptanalysis
An Efficient Deep Learning based Multi-Level Feature Extraction Network for Multi-modal Medical Image Fusion
Syed Munawwar,Panyam Vuppu Gopi Krishna Rao
#Image fusion
#deep learning
#feature extraction
#soft attention
#and modified resblock
A Dual-End Recommendation Algorithm Integrating User Intent and Knowledge-Aware Attention Networks
Zijie Ji,Teng Lv,Yi Yu
#Recommendation model
#user intent
#knowledge-aware attention
#dual-end recommendation
GNN-DQL-Based Chronic Kidney Disease Classification Using GFR in the Internet of Medical Things Environment
Bhavani Tatiparti,Vydeki Dharmar
#Deep learning
#neural network
#Q-learning
#glomerular filtration rate
#mayfly optimization
#optimal features
#parameter optimization
#AMO
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
1
2
3
4
5
6
7
8
9
10
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint