ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Recovery
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Extension for Real Time Applications
#
Extension for Real Time Applications
#
Computer and Information Science Department, Univer sity Technology Patroness, Malaysia
# Critical service
# recovery
# resources reconfigurati on
# survivability
High-Availability Decentralized Cryptographic Multi-Agent Key Recovery
# Cryptographic key management
# secret sharing
# key r ecovery
# KRAs
Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT
Abstract: Content authentication requires that the image watermarks must highlight malicious attacks while tolerating
#Content authentication
# self authentication
# recovery watermark
# DWT
# PQ sequence
Reverse Engineering of Object Oriented System
Abstract: Now a day’s common problem faced by software community is to understand the legacy code. A decade ago the
#Clustering
# feature selection
# hierarchical
# reverse engineering
# rational software architect
Verification of Cooperative Transient Fault Diagnosis and Recovery in Critical
Zibouda Aliouat
#Group membership protocol
# formal verification
# fau lt)tolerant distributed algorithm
# node reintegration
Driving Signature Analysis for Auto-Theft Recovery
Adrian Bosire,Damian Maingi
#Deep learning
#swarm intelligence
#driving signature
#intelligent transportation system
Half-Duplex and Full-Duplex Performance Comparison for Different Fading Channel Using HMR Protocol in MIMO Technology
Daphney Joann,Vayanaperumal Rajamani
#Relay network
#HD
#FD
#HMR Protocol
#MIMO
#BER
#SNR
Optimal Image Based Information Hiding with One-dimensional Chaotic Systems and Dynamic Programming
Yinglei Song,Jia Song,Junfeng Qu
#Encryption and hiding
#minimized hiding effects
#improved security
#convenient recovery
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint