ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: SNS
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
TSO Clustered Protocol to Extend Lifetime of IoT Based Mobile Wireless Sensor Networks
Giji Kiruba Dasebenezer,Benita Joselin
#MWSN
#clustering
#sensor nodes
#TSO
#PSO
Genetic Algorithm with Random and Memory Immigrant Strategies for Solving Dynamic Load Balanced Clustering Problem in Wireless Sensor Networks
Mohaideen Pitchai
#Wireless sensor networks
#genetic algorithm
#load balanced clustering
#random immigrants
#memory immigrants
Omar Alheyasat
#
Aware-Routing Protocol using Best First Search Algorithm in Wireless Sensor
and areas; this led to ubiquity wireless sensor networks everywhere. Energy consumption is considered as the biggest
#
Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol for WSNs
Abstract: Due to the availability of multiple sensing units o n a single radio board of the modern sensor motes, some sensor
#Heterogeneous
# congestion
# inter'queue
# intra'queue
# scheduler
# sensor
A Cloud-based Architecture for Mitigating Privacy
Issues in Online Social Networks
#Online social network
# cloud computing
# user’s privacy
# access control
# broadcast encryption
Securely Publishing Social Network Data Emad Elabd1, Hatem AbdulKader1, and Waleed Ead2 1Faculty of computers and information, Menoufia University, Egypt 2Faculty of Computers and Information, Beni-Suef University, Egypt
Abstract: Online Social Networks (OSNs) data are published to be used for the purpose of analysis in scientific research. Yet,
#Data publishing
# privacy preserving
# online social networks
# background knowledge
# anonymization
# frequent pattern mining
MCA-MAC: Modified Cooperative Access MAC Protocol in Wireless Sensor Networks
Aya Hossam1, Tarek Salem2, Anar Abdel Hady2, and Sherine Abd El-Kader2 1Electrical Engineering Department, Faculty of Engineering (Shoubra), Benha University, Egypt
#WSN
# MAC protocol
# cooperative communication
# energy efficient
In Loco Identity Fraud Detection Model Using Statistical Analysis for Social Networking Sites: A Case Study with Facebook
Shalini Hanok,Shankaraiah
#Continuous authentication
#in loco
#SNS
#identity fraud
#stalkers
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint