ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: throughput
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
SHARD-FEMF: Adaptive Forensic Evidence Management Framework using Blockchain Sharding and IPFS
Praveen Dhulavvagol,Sashikumar Totad,Atrey Anagal
#Blockchain
#sharding
#ethereum
#base64
#IPFS
Achieving better Resource Utilization by Implementing a High-Performance Intelligent Framework in a Distributed Environment
Srinivasan Narayanasamy,MohanKumar Palanichamy,Selvam Lakshmanan,ArokiaRenjith Jerald
#Computational intelligence
#scheduling
#high-performance computing
#resource utilization
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction
Nivethitha Vijayaraj,Sivasubramanian Arunagiri
#5G
#DWDM
#enhanced broadband
#eMBB
#mm-wave
#radio over fiber
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
Encryption Quality Measurement of a Proposed
#
Modelling Concurrent Mobile Transactions Execution in Broadcasting Environments
1
#Wireless broadcast
# data organization
# mobile transactions
KhatibandK.Gunavathi
# asymmetricnetworks
#TCPperformance
#ACK
#bandwidt h allocation
Interference Mitigation Technique
#Ultra-wideband
# power control
# narrowband interfere nce
# NBI
# TOA
The International Arab Journal of Information Techn ology, Vol. 11, No. 2, March 2014
#CSFQ
# quality of service
# MQFQ
# priority scheduler
Inter-Path OOS Packets Differentiation Based
Samiullah Khan and Muhammad Abdul Qadir
#Multipath transmission
# RBuf blocking
# out-of-sequence arrival
# throughput
# congestion window
Security Mechanism against Sybil Attacks for High-Throughput Multicast Routing in Wireless
Abstract: Wireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They
#Secure multicast routing
# sybil attack
# random key predistribution
A Network Performance Aware QoS Based Workflow Scheduling for Grid Services
Abstract: Grids enable sharing, selection and aggregation of geographically distributed resources among various
#Grid scheduling
# QoS
# DAG
# execution time
# deadline
# trust rate
Capacity Enhancement Based on Dynamically
Mohammed Abd-Elnaby, Mohamad Elhadad, and El-Sayed El-Rabaie
#LTE
# packet scheduling
# PF
# Fairness
# OFDM
Bayesian Information Criterion in LTE Downlink Scheduling Algorithm
Abstract: Real time multimedia has been a major trend in people daily life. With the rise of demands in faster internet
#LTE
# criterion-based
# bayesian information criterion
# downlink scheduling
# quality of service
1
2
3
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint