ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Operation
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration
Khushboo Agarwal,Manish Dixit
#Computer vision
#face recognition
#image restoration
#occlusions
#pre-processing
#spatial information
#PCA
#GAN networks
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
Muzzle Classification Using Neural Networks
Ibrahim El-Henawy, Hazem El-bakry, and Hagar El-Hadad
#Muzzle classification
#image processing
#neural networks
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
A Simple and Stable Method of Creating Fingerprint Features With Image Rotation
Mohamad Al-Laham,Mohammad Al-Ma'aitah,Ziad Alqadi
#Fingerprint features
#hit-and-miss
#bifurcation
#isolated point
#crossover
#connected points
#MAS
# CF
# volume discount
# search cost
# stability
KP-TrieAlgorithmfor Update and Search Operations
Abstract:Radix-Tree is a space optimized data structure that performs data compression by means of cluster nodes that share
#Trie
# radix tree
# data structure
# branch factor
# indexing
# tree structure
# information retrieval
Hierarchical Based Group Key Transfer for Secure
1Department of Information Science and Technology, A nna University, India
#
85
Player’s Prisoner’s Dilemma
#
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc Essam Natsheh, Adznan B. Jantan, Sabira Khatun, and Shamala Subramaniam
powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic
#Active queue management
# ad-hoc networks
# fuzzy systems
# intelligent networks
# network congestion
Incompatibility Dimensions and Integration of Atomic Commit Protocols
Abstract: Advanced software application systems contain transactions that tend to traverse incompatible database sites
#Two-phase commit
# voting protocols
# distributed transaction processing
# integrated database systems
# internet transactions
# electronic services and electronic commerce
2
# Supply chain management
# supply chain operations re ference-model
# supply chain
Faculty of Science, Computer Information Systems De partment, Bethlehem University, Palestine
# Brain-Computer interface
# ANFIS algorithm
# fuzzy l ogic
# electroencephalogram
VI-SDB: A Convivial Approach for Description and Manipulation of
Faculty of Sciences of Tunis, Tunisia University, T unisia
# Deductive database
# stratified database
# EPN formal ism
# GUI
Receivers Using Network Processor IXP 2400
# Buffer utilization
# network processor
# play out buf fer
# play back time
# video streaming Received February 6
# 2007; accepted November 6
# 200 8 1
Language Based Information Routing Security: Policy Enforcement
, and Fredrick Mtenzi 2
#Security policy
# routing
# condition statements Received January 5
# 2007; accepted November 6
# 2007 1
An Integrated Radix-4 Modular Divider/Multiplier
1
#Cryptography
# number theory
# finite field arithmetic
# hardware de sign
# and radix$4
1
2
3
4
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint