ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: transmission
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
A New Way of Accelerating Web by Compressing Data with Back Reference-Prefer Geflochtener
Kushwaha Singh,Challa Krishna,and Saini Kumar
#Backward references
#shortest path technique
#HTTP
#iterative compression
#web
#LZSS and LZ77
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
Sri Venkateswara College of Engineering, India
#Image encryption
# modular addition
# chaotic maps
# l ogistic map
# socek
# grp
# cross
# block cipher
Secure Verification Technique for Defending IP
#
Curve Cryptography and its Variants
#
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
Department of Electronics Engineering, Anna Univers ity, India. 2Department of Information Technology, Thiagarajar C ollege of Engineering, India.
# Hybrid MANET
# mobile agents
# AODV ALMA
# adaptive g ateway discovery
Department of Electronics and Communication Engine ering, PSG College of Technology, India.
# wavelet
#multiwavelet
#SPIHT
#SPECK
Bahi Hour and Shihab Hameed
#IEEE 802
Inter-Path OOS Packets Differentiation Based
Samiullah Khan and Muhammad Abdul Qadir
#Multipath transmission
# RBuf blocking
# out-of-sequence arrival
# throughput
# congestion window
SAK-AKA: A Secure Anonymity Key of Authentication and Key Agreement protocol for
Department of Computer Science and Information, Aljouf University, Saudi Arabia
#3GPP
# LTE network
# IPsec protocol
# UMTS-AKA protocol
# EPS-AKA protocol
Using Visible and Invisible Watermarking Algorithms for Indexing Medical Images
India 2Department of Computer Science and Engineering, Hindusthan Institute of Technology, India
#Lung CT image
# visible watermarking
# invisible watermarking
# watermark embedding
# watermark extraction
Bayesian Information Criterion in LTE Downlink Scheduling Algorithm
Abstract: Real time multimedia has been a major trend in people daily life. With the rise of demands in faster internet
#LTE
# criterion-based
# bayesian information criterion
# downlink scheduling
# quality of service
1
2
3
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint