ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: scalability
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
A Neuro Phenotypic Evolution Algorithm for Recognizing Human Motion Type
Ivan Stepanyan,Safa Hameed
#Breaking up processes
#combining processes
#multi-dimensional data
#optimization
#phenotypic neuro-evolutionary
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities
Deepali Bajaj,Anita Goel,Suresh Gupta
#Microservices
#static code analysis
#microservice identification
#software refactoring
#database partitioning
#move method refactoring
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
An Effective Management Model for Data Caching in MANET Environment
Amer Abu Salem
#MANET
#NS3
#admission control
#replacement strategy
#consistency strategy
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
Jinpeng Chen, Yu Liu, and Deyi Li
#
A Dynamic Sliding Load Balancing Strategy in Distributed Systems Ahmad Dalal ah
perform a load balancing process. Upon the completion of a given period, the groups are to be rotated by shifting each group
#Load balancing
# distributed systems
# scalability
# message passing
Wavelet Based Video Encoder Using KCDS
# Codec
# motion estimation
# SPIHT
# video encoder
# wav elets
Inter-Path OOS Packets Differentiation Based
Samiullah Khan and Muhammad Abdul Qadir
#Multipath transmission
# RBuf blocking
# out-of-sequence arrival
# throughput
# congestion window
Intelligent Replication for Distributed Active Real- Time Databases Systems
nature and need to handle data in a timely fashion. Obtaining data from remote sites may take long time making the temporal
#
Advanced Architecture for Java Universal Message Passing (AA-JUMP)
Abstract: The Architecture for Java Universal Message Passing (A-JUMP) is a Java based message passing framework. A-
#A-JUMP
# java
# universal message passing
# MPI
# distributed computing
A Grid Enabled E-Theses and Dissertations Repository System
Faculty of Computer Science and Information Technology, University of Malaya, Malaysia
# ETD
# GREET
# catalogue
# repository services
# Enterprise information security
# enterprise modelli ng
# risk assessment
# risk assessment method
# resour ce based view
# attack trees
# risk management
The Impact of Natural Language Preprocessing on Big Data Sentiment Analysis
Mariam Khader, Arafat Awajan, and Ghazi Al-Naymat
#Big data
# natural language processing
# MapReduce framework
# Naïve Bayes and sentiment analysis
Evolutionary Testing for Timing Analysis of Parallel Embedded Software
Muhammad Waqar Aziz and Syed Abdul Baqi Shah
#Embedded real-time software
# worst-case execution-time analysis
# measurement-based analysis
# end-to-end testing
# genetic algorithm
# parallel computing
Identifier (ID) based Enhanced Service for Device Communication and Control in Future Networks
Muhammad Khan and DoHyeun Kim
#Future networks
# identifier
# ID
# device control
# service
# efficient
1
2
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint