ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Transaction
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
Using Fuzzy Clustering Models to Predict User Demand in Precision Marketing of Cross-Border E-Commerce
Jianzhong Li,Fengwei Zhang,Nana Liu
#Cross border
#e-commerce
#fuzzy c-means
#stagnancy degree
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services
Abdelraouf Ishtaiwi,Ahmad Nabot,Omar Alzubi,Awad Ramadan,Abdulbasit Darem,Asma Alhashmi,Mohammad Alauthman,Amjad Aldweesh
#Hybrid concurrency control
#local validation
#global validation
#edge-cloud
Explore the Relationship between House Prices and Crime Rate in the UK Using Machine Learning Techniques
Soudabeh Motevali,Hamzeh Aljawawdeh,Sami Abuezhayeh,Eman Qaddoumi
#Machine learning techniques
#decision trees
#random forest
#house prices
#crime rates
#house price pre-diction
Explore the Relationship between House Prices and Crime Rate in the UK Using Machine Learning Techniques
Soudabeh Motevali,Hamzeh Aljawawdeh,Sami Abuezhayeh,Eman Qaddoumi
#Machine learning techniques
#decision trees
#random forest
#house prices
#crime rates
#house price pre-diction
Improved Collaborative Filtering Recommender System Based on Hybrid Similarity Measures
Mohamed Abdi,George Okeyo,Ronald Mwangi
#Recommender systems
#collaborative filtering
#similarity measure
#Adjusted Triangle similarity
#Jaccard similarity
#user rating preference behavior
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
An Effective Reference-Point-Set (RPS) Based Bi-Directional Frequent Itemset Generation
Ambily Balaram,Nedunchezhian Raju
#Reference point
#reference-point-set
#transactional buckets
#sparse region
#dense region
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security
Saravanan Arumugam
#Cybersecurity
#encryption
#decryption
#fingerprint based biometric key
#data security
#symmetric key encryption
#asymmetric key encryption
A Differential Geometry Perspective about
#
Design and Construction of Secure Digital Will System
#Will system
# key escrow
# testamentary trust
An Efficient Approach for Mining Frequent Item
1Division of Data Science, Ton Duc Thang University, Vietnam 2Faculty of Information Technology, Ton Duc Thang University, Vietnam 3Faculty of Technology, Pacific Ocean University, Vietnam 4Department of Computer Science and Information Engineering,
#Data mining
# frequent item sets
# incremental mining
# pre-large item sets
# item set-tidset tree
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Modelling Concurrent Mobile Transactions Execution in Broadcasting Environments
1
#Wireless broadcast
# data organization
# mobile transactions
Incompatibility Dimensions and Integration of Atomic Commit Protocols
Abstract: Advanced software application systems contain transactions that tend to traverse incompatible database sites
#Two-phase commit
# voting protocols
# distributed transaction processing
# integrated database systems
# internet transactions
# electronic services and electronic commerce
#Clustering
# data mining
# dispersion
# multiple datab ases
# stability
An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques
Abstract: Nowadays, the vital parts of the business programs are the data warehouses and the data mining techni ques.
# Data warehousing system
# data cleaning
# data transf ormation
# data loading
# dirty data
# RFID
# suspicious tags
1
2
3
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint