ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: delay
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Vijayanand Radhakrishnan,Ulaganathan Meenakshisundaram,Ganeshkumar Pugalendhi,John Basha
#Packet based attack detection
#Bi-LSTM
#multi-head attention
#NAN communication security
#NS3 simulation
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Vijayanand Radhakrishnan,Ulaganathan Meenakshisundaram,Ganeshkumar Pugalendhi,John Basha
#Packet based attack detection
#Bi-LSTM
#multi-head attention
#NAN communication security
#NS3 simulation
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Semantic Adaptation of Multimedia Documents
Azze-Eddine Maredj,Nourredine Tonkin
#Multimedia document adaptation
#semantic adaptation
#conceptual neighborhood graph
#relaxation graph
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
A Novel Adaptive ANC Algorithm for Removal of Background Noise in Speech Applications
Vinothkumar.G,Manoj Kumar.D
#ANC
#FxNLMS
#NIHL
#speech enhancement
#background noise cancellation
#MSE
#SNRi
#PESQ and STOI
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
TSO Clustered Protocol to Extend Lifetime of IoT Based Mobile Wireless Sensor Networks
Giji Kiruba Dasebenezer,Benita Joselin
#MWSN
#clustering
#sensor nodes
#TSO
#PSO
Genetic Algorithm with Random and Memory Immigrant Strategies for Solving Dynamic Load Balanced Clustering Problem in Wireless Sensor Networks
Mohaideen Pitchai
#Wireless sensor networks
#genetic algorithm
#load balanced clustering
#random immigrants
#memory immigrants
# Job scheduling
# data replication
# RC
# replica manag er
# resource discovery
# counting bloom filter
iHPProxy:Improving the Performance of HPProxy by Adding Extra Hot-Points
Abstract:In recent years, the interest of Internet users turned intoviewingvideos such asVideo-on-Demand (VoD), online
#Proxycaching
# shift distance
#HPProxy
# cache replacement
# multimedia streaming
#VoD
A Dynamic Traffic Shaping Technique for a Scalable QoS in ATM Networks
, Ganiyu Aderounmu 2
#A synchronous transfer mode
# quality of service
# complete sharing / gradual release
# traffic shaper
# constant bit rate
# variable bit rate
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
Department of Electronics Engineering, Anna Univers ity, India. 2Department of Information Technology, Thiagarajar C ollege of Engineering, India.
# Hybrid MANET
# mobile agents
# AODV ALMA
# adaptive g ateway discovery
Receivers Using Network Processor IXP 2400
# Buffer utilization
# network processor
# play out buf fer
# play back time
# video streaming Received February 6
# 2007; accepted November 6
# 200 8 1
1
2
3
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint